1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
declare(strict_types=1); |
4
|
|
|
|
5
|
|
|
/** |
6
|
|
|
* Teampass - a collaborative passwords manager. |
7
|
|
|
* --- |
8
|
|
|
* This file is part of the TeamPass project. |
9
|
|
|
* |
10
|
|
|
* TeamPass is free software: you can redistribute it and/or modify it |
11
|
|
|
* under the terms of the GNU General Public License as published by |
12
|
|
|
* the Free Software Foundation, version 3 of the License. |
13
|
|
|
* |
14
|
|
|
* TeamPass is distributed in the hope that it will be useful, |
15
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
16
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
17
|
|
|
* GNU General Public License for more details. |
18
|
|
|
* |
19
|
|
|
* You should have received a copy of the GNU General Public License |
20
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>. |
21
|
|
|
* |
22
|
|
|
* Certain components of this file may be under different licenses. For |
23
|
|
|
* details, see the `licenses` directory or individual file headers. |
24
|
|
|
* --- |
25
|
|
|
* @file items.queries.php |
26
|
|
|
* @author Nils Laumaillé ([email protected]) |
27
|
|
|
* @copyright 2009-2025 Teampass.net |
28
|
|
|
* @license GPL-3.0 |
29
|
|
|
* @see https://www.teampass.net |
30
|
|
|
*/ |
31
|
|
|
|
32
|
|
|
|
33
|
|
|
use voku\helper\AntiXSS; |
34
|
|
|
use TeampassClasses\NestedTree\NestedTree; |
35
|
|
|
use TeampassClasses\SessionManager\SessionManager; |
36
|
|
|
use Symfony\Component\HttpFoundation\Request as SymfonyRequest; |
37
|
|
|
use TeampassClasses\Language\Language; |
38
|
|
|
use EZimuel\PHPSecureSession; |
39
|
|
|
use TeampassClasses\PerformChecks\PerformChecks; |
40
|
|
|
use TeampassClasses\ConfigManager\ConfigManager; |
41
|
|
|
use OTPHP\TOTP; |
42
|
|
|
use TeampassClasses\EmailService\EmailService; |
43
|
|
|
use TeampassClasses\EmailService\EmailSettings; |
44
|
|
|
|
45
|
|
|
// Load functions |
46
|
|
|
require_once 'main.functions.php'; |
47
|
|
|
|
48
|
|
|
// init |
49
|
|
|
loadClasses('DB'); |
50
|
|
|
$session = SessionManager::getSession(); |
51
|
|
|
$request = SymfonyRequest::createFromGlobals(); |
52
|
|
|
$lang = new Language($session->get('user-language') ?? 'english'); |
53
|
|
|
|
54
|
|
|
// Load config |
55
|
|
|
$configManager = new ConfigManager(); |
56
|
|
|
$SETTINGS = $configManager->getAllSettings(); |
57
|
|
|
|
58
|
|
|
// Do checks |
59
|
|
|
// Instantiate the class with posted data |
60
|
|
|
$checkUserAccess = new PerformChecks( |
61
|
|
|
dataSanitizer( |
62
|
|
|
[ |
63
|
|
|
'type' => null !== $request->request->get('type') ? htmlspecialchars($request->request->get('type')) : '', |
64
|
|
|
], |
65
|
|
|
[ |
66
|
|
|
'type' => 'trim|escape', |
67
|
|
|
], |
68
|
|
|
), |
69
|
|
|
[ |
70
|
|
|
'user_id' => returnIfSet($session->get('user-id'), null), |
71
|
|
|
'user_key' => returnIfSet($session->get('key', 'SESSION'), null), |
72
|
|
|
] |
73
|
|
|
); |
74
|
|
|
// Handle the case |
75
|
|
|
echo $checkUserAccess->caseHandler(); |
76
|
|
|
if ( |
77
|
|
|
$checkUserAccess->userAccessPage('items') === false || |
78
|
|
|
$checkUserAccess->checkSession() === false |
79
|
|
|
) { |
80
|
|
|
// Not allowed page |
81
|
|
|
$session->set('system-error_code', ERR_NOT_ALLOWED); |
82
|
|
|
include $SETTINGS['cpassman_dir'] . '/error.php'; |
83
|
|
|
exit; |
84
|
|
|
} |
85
|
|
|
|
86
|
|
|
// Define Timezone |
87
|
|
|
date_default_timezone_set($SETTINGS['timezone'] ?? 'UTC'); |
88
|
|
|
|
89
|
|
|
// Set header properties |
90
|
|
|
header('Content-type: text/html; charset=utf-8'); |
91
|
|
|
header('Cache-Control: no-cache, no-store, must-revalidate'); |
92
|
|
|
error_reporting(E_ERROR); |
93
|
|
|
set_time_limit(0); |
94
|
|
|
|
95
|
|
|
// --------------------------------- // |
96
|
|
|
|
97
|
|
|
|
98
|
|
|
/* |
99
|
|
|
* Define Timezone |
100
|
|
|
*/ |
101
|
|
|
if (isset($SETTINGS['timezone']) === true) { |
102
|
|
|
date_default_timezone_set($SETTINGS['timezone']); |
103
|
|
|
} else { |
104
|
|
|
date_default_timezone_set('UTC'); |
105
|
|
|
} |
106
|
|
|
|
107
|
|
|
require_once $SETTINGS['cpassman_dir'] . '/includes/language/' . $session->get('user-language') . '.php'; |
108
|
|
|
header('Content-type: text/html; charset=utf-8'); |
109
|
|
|
header('Cache-Control: no-cache, must-revalidate'); |
110
|
|
|
|
111
|
|
|
|
112
|
|
|
// Prepare nestedTree |
113
|
|
|
$tree = new NestedTree(prefixTable('nested_tree'), 'id', 'parent_id', 'title'); |
114
|
|
|
|
115
|
|
|
// Load AntiXSS |
116
|
|
|
$antiXss = new AntiXSS(); |
117
|
|
|
|
118
|
|
|
// Ensure Complexity levels are translated |
119
|
|
|
if (defined('TP_PW_COMPLEXITY') === false) { |
120
|
|
|
define( |
121
|
|
|
'TP_PW_COMPLEXITY', |
122
|
|
|
array( |
123
|
|
|
TP_PW_STRENGTH_1 => array(TP_PW_STRENGTH_1, $lang->get('complex_level1'), 'fas fa-thermometer-empty text-danger'), |
124
|
|
|
TP_PW_STRENGTH_2 => array(TP_PW_STRENGTH_2, $lang->get('complex_level2'), 'fas fa-thermometer-quarter text-warning'), |
125
|
|
|
TP_PW_STRENGTH_3 => array(TP_PW_STRENGTH_3, $lang->get('complex_level3'), 'fas fa-thermometer-half text-warning'), |
126
|
|
|
TP_PW_STRENGTH_4 => array(TP_PW_STRENGTH_4, $lang->get('complex_level4'), 'fas fa-thermometer-three-quarters text-success'), |
127
|
|
|
TP_PW_STRENGTH_5 => array(TP_PW_STRENGTH_5, $lang->get('complex_level5'), 'fas fa-thermometer-full text-success'), |
128
|
|
|
) |
129
|
|
|
); |
130
|
|
|
} |
131
|
|
|
|
132
|
|
|
// Prepare POST variables |
133
|
|
|
$data = [ |
134
|
|
|
'type' => $request->request->filter('type', '', FILTER_SANITIZE_SPECIAL_CHARS), |
135
|
|
|
'data' => $request->request->filter('data', '', FILTER_SANITIZE_SPECIAL_CHARS), |
136
|
|
|
'key' => $request->request->filter('key', '', FILTER_SANITIZE_SPECIAL_CHARS), |
137
|
|
|
'label' => $request->request->filter('label', '', FILTER_SANITIZE_SPECIAL_CHARS), |
138
|
|
|
'status' => $request->request->filter('status', '', FILTER_SANITIZE_SPECIAL_CHARS), |
139
|
|
|
'cat' => $request->request->filter('cat', '', FILTER_SANITIZE_SPECIAL_CHARS), |
140
|
|
|
'receipt' => $request->request->filter('receipt', '', FILTER_SANITIZE_SPECIAL_CHARS), |
141
|
|
|
'itemId' => $request->request->filter('item_id', '', FILTER_SANITIZE_SPECIAL_CHARS), |
142
|
|
|
'folderId' => $request->request->filter('folder_id', '', FILTER_SANITIZE_SPECIAL_CHARS), |
143
|
|
|
'id' => $request->request->filter('id', '', FILTER_SANITIZE_SPECIAL_CHARS), |
144
|
|
|
'destination' => $request->request->filter('destination', '', FILTER_SANITIZE_SPECIAL_CHARS), |
145
|
|
|
'source' => $request->request->filter('source', '', FILTER_SANITIZE_SPECIAL_CHARS), |
146
|
|
|
'userId' => $request->request->filter('user_id', '', FILTER_SANITIZE_SPECIAL_CHARS), |
147
|
|
|
'getType' => $request->query->get('type', ''), |
148
|
|
|
'getTerm' => $request->query->get('term', ''), |
149
|
|
|
'option' => $request->request->filter('option', '', FILTER_SANITIZE_SPECIAL_CHARS), |
150
|
|
|
'fileSuffix' => $request->request->filter('file_suffix', '', FILTER_SANITIZE_SPECIAL_CHARS), |
151
|
|
|
'context' => $request->request->filter('context', '', FILTER_SANITIZE_SPECIAL_CHARS), |
152
|
|
|
'notifyType' => $request->request->filter('notify_type', '', FILTER_SANITIZE_SPECIAL_CHARS), |
153
|
|
|
'timestamp' => $request->request->filter('timestamp', '', FILTER_SANITIZE_SPECIAL_CHARS), |
154
|
|
|
'itemKey' => $request->request->filter('item_key', '', FILTER_SANITIZE_SPECIAL_CHARS), |
155
|
|
|
'action' => $request->request->filter('action', '', FILTER_SANITIZE_SPECIAL_CHARS), |
156
|
|
|
]; |
157
|
|
|
|
158
|
|
|
$filters = [ |
159
|
|
|
'type' => 'trim|escape', |
160
|
|
|
'data' => 'trim|escape', |
161
|
|
|
'key' => 'trim|escape', |
162
|
|
|
'label' => 'trim|escape', |
163
|
|
|
'status' => 'trim|escape', |
164
|
|
|
'cat' => 'trim|escape', |
165
|
|
|
'receipt' => 'trim|escape', |
166
|
|
|
'itemId' => 'cast:integer', |
167
|
|
|
'folderId' => 'cast:integer', |
168
|
|
|
'id' => 'cast:integer', |
169
|
|
|
'destination' => 'cast:integer', |
170
|
|
|
'source' => 'cast:integer', |
171
|
|
|
'userId' => 'cast:integer', |
172
|
|
|
'getType' => 'trim|escape', |
173
|
|
|
'getTerm' => 'trim|escape', |
174
|
|
|
'option' => 'trim|escape', |
175
|
|
|
'fileSuffix' => 'trim|escape', |
176
|
|
|
'context' => 'trim|escape', |
177
|
|
|
'notifyType' => 'trim|escape', |
178
|
|
|
'timestamp' => 'cast:integer', |
179
|
|
|
'itemKey' => 'trim|escape', |
180
|
|
|
'action' => 'trim|escape', |
181
|
|
|
]; |
182
|
|
|
|
183
|
|
|
$inputData = dataSanitizer( |
184
|
|
|
$data, |
185
|
|
|
$filters |
186
|
|
|
); |
187
|
|
|
|
188
|
|
|
// List of teampass users ids (and current user id). |
189
|
|
|
$tpUsersIDs = [ |
190
|
|
|
OTV_USER_ID, |
191
|
|
|
SSH_USER_ID, |
192
|
|
|
API_USER_ID, |
193
|
|
|
$session->get('user-id'), |
194
|
|
|
]; |
195
|
|
|
|
196
|
|
|
// Do asked action |
197
|
|
|
switch ($inputData['type']) { |
198
|
|
|
/* |
199
|
|
|
* CASE |
200
|
|
|
* creating a new ITEM |
201
|
|
|
*/ |
202
|
|
|
case 'new_item': |
203
|
|
|
// Check KEY and rights |
204
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
205
|
|
|
echo (string) prepareExchangedData( |
206
|
|
|
array( |
207
|
|
|
'error' => true, |
208
|
|
|
'message' => $lang->get('key_is_not_correct'), |
209
|
|
|
), |
210
|
|
|
'encode' |
211
|
|
|
); |
212
|
|
|
break; |
213
|
|
|
} |
214
|
|
|
if ($session->get('user-read_only') === 1) { |
215
|
|
|
echo (string) prepareExchangedData( |
216
|
|
|
array( |
217
|
|
|
'error' => true, |
218
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
219
|
|
|
), |
220
|
|
|
'encode' |
221
|
|
|
); |
222
|
|
|
break; |
223
|
|
|
} |
224
|
|
|
|
225
|
|
|
// init |
226
|
|
|
$returnValues = []; |
227
|
|
|
$arrData = []; |
228
|
|
|
// decrypt and retreive data in JSON format |
229
|
|
|
$dataReceived = prepareExchangedData( |
230
|
|
|
$inputData['data'], |
231
|
|
|
'decode' |
232
|
|
|
); |
233
|
|
|
|
234
|
|
|
if (is_array($dataReceived) === true && count($dataReceived) > 0) { |
235
|
|
|
// Prepare variables |
236
|
|
|
$post_anyone_can_modify = filter_var($dataReceived['anyone_can_modify'], FILTER_SANITIZE_NUMBER_INT); |
237
|
|
|
$post_complexity_level = filter_var($dataReceived['complexity_level'], FILTER_SANITIZE_NUMBER_INT); |
238
|
|
|
$post_description = $antiXss->xss_clean($dataReceived['description']); |
239
|
|
|
$post_diffusion_list = filter_var_array( |
240
|
|
|
$dataReceived['diffusion_list'], |
241
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
242
|
|
|
); |
243
|
|
|
$post_diffusion_list_names = filter_var_array( |
244
|
|
|
$dataReceived['diffusion_list_names'], |
245
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
246
|
|
|
); |
247
|
|
|
$post_email = filter_var(htmlspecialchars_decode($dataReceived['email']), FILTER_SANITIZE_EMAIL); |
248
|
|
|
$post_fields = filter_var_array( |
249
|
|
|
$dataReceived['fields'], |
250
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
251
|
|
|
); |
252
|
|
|
$inputData['folderId'] = filter_var($dataReceived['folder'], FILTER_SANITIZE_NUMBER_INT); |
253
|
|
|
$post_folder_is_personal = filter_var($dataReceived['folder_is_personal'], FILTER_SANITIZE_NUMBER_INT); |
254
|
|
|
$inputData['label'] = filter_var($dataReceived['label'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
255
|
|
|
$post_login = filter_var($dataReceived['login'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
256
|
|
|
$post_password = htmlspecialchars_decode($dataReceived['pw']); |
257
|
|
|
$post_tags = htmlspecialchars($dataReceived['tags']); |
258
|
|
|
$post_template_id = filter_var($dataReceived['template_id'], FILTER_SANITIZE_NUMBER_INT); |
259
|
|
|
$post_url = filter_var(htmlspecialchars_decode($dataReceived['url']), FILTER_SANITIZE_URL); |
260
|
|
|
$post_uploaded_file_id = filter_var($dataReceived['uploaded_file_id'], FILTER_SANITIZE_NUMBER_INT); |
261
|
|
|
$inputData['userId'] = filter_var($dataReceived['user_id'], FILTER_SANITIZE_NUMBER_INT); |
262
|
|
|
$post_to_be_deleted_after_date = isset($dataReceived['to_be_deleted_after_date']) === true ? filter_var($dataReceived['to_be_deleted_after_date'], FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
263
|
|
|
$post_to_be_deleted_after_x_views = filter_var($dataReceived['to_be_deleted_after_x_views'], FILTER_SANITIZE_NUMBER_INT); |
264
|
|
|
$post_fa_icon = isset($dataReceived['fa_icon']) === true ? filter_var($dataReceived['fa_icon'], FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
265
|
|
|
|
266
|
|
|
// Restricted to users |
267
|
|
|
$post_restricted_to = is_array($dataReceived['restricted_to']) |
268
|
|
|
? filter_var_array($dataReceived['restricted_to'], FILTER_SANITIZE_FULL_SPECIAL_CHARS) |
269
|
|
|
: ''; |
270
|
|
|
|
271
|
|
|
// Restricted to roles |
272
|
|
|
$post_restricted_to_roles = is_array($dataReceived['restricted_to_roles']) |
273
|
|
|
? filter_var_array($dataReceived['restricted_to_roles'], FILTER_SANITIZE_FULL_SPECIAL_CHARS) |
274
|
|
|
: ''; |
275
|
|
|
|
276
|
|
|
//-> DO A SET OF CHECKS |
277
|
|
|
// Perform a check in case of Read-Only user creating an item in his PF |
278
|
|
|
if ($session->get('user-read_only') === 1 |
279
|
|
|
&& (in_array($inputData['folderId'], $session->get('user-personal_folders')) === false |
280
|
|
|
|| $post_folder_is_personal !== 1) |
281
|
|
|
) { |
282
|
|
|
echo (string) prepareExchangedData( |
283
|
|
|
array( |
284
|
|
|
'error' => true, |
285
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
286
|
|
|
), |
287
|
|
|
'encode' |
288
|
|
|
); |
289
|
|
|
break; |
290
|
|
|
} |
291
|
|
|
|
292
|
|
|
// Is author authorized to create in this folder |
293
|
|
|
if (count($session->get('user-list_folders_limited')) > 0) { |
294
|
|
|
if (in_array($inputData['folderId'], array_keys($session->get('user-list_folders_limited'))) === false |
295
|
|
|
&& in_array($inputData['folderId'], $session->get('user-accessible_folders')) === false |
296
|
|
|
&& in_array($inputData['folderId'], $session->get('user-personal_folders')) === false |
297
|
|
|
) { |
298
|
|
|
echo (string) prepareExchangedData( |
299
|
|
|
array( |
300
|
|
|
'error' => true, |
301
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
302
|
|
|
), |
303
|
|
|
'encode' |
304
|
|
|
); |
305
|
|
|
break; |
306
|
|
|
} |
307
|
|
|
} else { |
308
|
|
|
if (in_array($inputData['folderId'], $session->get('user-accessible_folders')) === false) { |
309
|
|
|
echo (string) prepareExchangedData( |
310
|
|
|
array( |
311
|
|
|
'error' => true, |
312
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
313
|
|
|
), |
314
|
|
|
'encode' |
315
|
|
|
); |
316
|
|
|
break; |
317
|
|
|
} |
318
|
|
|
} |
319
|
|
|
|
320
|
|
|
// perform a check in case of Read-Only user creating an item in his PF |
321
|
|
|
if ( |
322
|
|
|
$session->get('user-read_only') === 1 |
323
|
|
|
&& in_array($inputData['folderId'], $session->get('user-personal_folders')) === false |
324
|
|
|
) { |
325
|
|
|
echo (string) prepareExchangedData( |
326
|
|
|
array( |
327
|
|
|
'error' => true, |
328
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
329
|
|
|
), |
330
|
|
|
'encode' |
331
|
|
|
); |
332
|
|
|
break; |
333
|
|
|
} |
334
|
|
|
|
335
|
|
|
// is pwd empty? |
336
|
|
|
if ( |
337
|
|
|
empty($post_password) === true |
338
|
|
|
&& $session->has('user-create_item_without_password') && null !== $session->get('user-create_item_without_password') |
339
|
|
|
&& (int) $session->get('user-create_item_without_password') !== 1 |
340
|
|
|
) { |
341
|
|
|
echo (string) prepareExchangedData( |
342
|
|
|
array( |
343
|
|
|
'error' => true, |
344
|
|
|
'message' => $lang->get('password_cannot_be_empty'), |
345
|
|
|
), |
346
|
|
|
'encode' |
347
|
|
|
); |
348
|
|
|
break; |
349
|
|
|
} |
350
|
|
|
|
351
|
|
|
// Check length |
352
|
|
|
$strlen_post_password = strlen($post_password); |
353
|
|
|
if ($strlen_post_password > $SETTINGS['pwd_maximum_length']) { |
354
|
|
|
echo (string) prepareExchangedData( |
355
|
|
|
array( |
356
|
|
|
'error' => true, |
357
|
|
|
'message' => $lang->get('password_too_long'), |
358
|
|
|
), |
359
|
|
|
'encode' |
360
|
|
|
); |
361
|
|
|
break; |
362
|
|
|
} |
363
|
|
|
|
364
|
|
|
// Need info in DB |
365
|
|
|
// About special settings |
366
|
|
|
$dataFolderSettings = DB::queryFirstRow( |
367
|
|
|
'SELECT bloquer_creation, bloquer_modification, personal_folder |
368
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
369
|
|
|
WHERE id = %i', |
370
|
|
|
$inputData['folderId'] |
371
|
|
|
); |
372
|
|
|
$itemInfos = []; |
373
|
|
|
$itemInfos['personal_folder'] = $dataFolderSettings['personal_folder']; |
374
|
|
|
if ((int) $itemInfos['personal_folder'] === 1) { |
375
|
|
|
$itemInfos['no_complex_check_on_modification'] = 1; |
376
|
|
|
$itemInfos['no_complex_check_on_creation'] = 1; |
377
|
|
|
} else { |
378
|
|
|
$itemInfos['no_complex_check_on_modification'] = (int) $dataFolderSettings['bloquer_modification']; |
379
|
|
|
$itemInfos['no_complex_check_on_creation'] = (int) $dataFolderSettings['bloquer_creation']; |
380
|
|
|
} |
381
|
|
|
|
382
|
|
|
// Get folder complexity |
383
|
|
|
$folderComplexity = DB::queryFirstRow( |
384
|
|
|
'SELECT valeur |
385
|
|
|
FROM ' . prefixTable('misc') . ' |
386
|
|
|
WHERE type = %s AND intitule = %i', |
387
|
|
|
'complex', |
388
|
|
|
$inputData['folderId'] |
389
|
|
|
); |
390
|
|
|
$itemInfos['requested_folder_complexity'] = $folderComplexity !== null ? (int) $folderComplexity['valeur'] : 0; |
391
|
|
|
|
392
|
|
|
// Check COMPLEXITY |
393
|
|
|
if ($post_complexity_level < $itemInfos['requested_folder_complexity'] && $itemInfos['no_complex_check_on_creation'] === 0) { |
394
|
|
|
echo (string) prepareExchangedData( |
395
|
|
|
array( |
396
|
|
|
'error' => true, |
397
|
|
|
'message' => $lang->get('error_security_level_not_reached'), |
398
|
|
|
), |
399
|
|
|
'encode' |
400
|
|
|
); |
401
|
|
|
break; |
402
|
|
|
} |
403
|
|
|
|
404
|
|
|
// ./ END |
405
|
|
|
|
406
|
|
|
// check if element doesn't already exist |
407
|
|
|
$itemExists = 0; |
408
|
|
|
$newID = ''; |
409
|
|
|
$data = DB::queryFirstRow( |
410
|
|
|
'SELECT * FROM ' . prefixTable('items') . ' |
411
|
|
|
WHERE label = %s AND inactif = %i', |
412
|
|
|
$inputData['label'], |
413
|
|
|
0 |
414
|
|
|
); |
415
|
|
|
$counter = DB::count(); |
416
|
|
|
if ($counter > 0) { |
417
|
|
|
$itemExists = 1; |
418
|
|
|
} else { |
419
|
|
|
$itemExists = 0; |
420
|
|
|
} |
421
|
|
|
|
422
|
|
|
// Manage case where item is personal. |
423
|
|
|
// In this case, duplication is allowed |
424
|
|
|
if ( |
425
|
|
|
isset($SETTINGS['duplicate_item']) === true |
426
|
|
|
&& (int) $SETTINGS['duplicate_item'] === 0 |
427
|
|
|
&& (int) $post_folder_is_personal === 1 |
428
|
|
|
) { |
429
|
|
|
$itemExists = 0; |
430
|
|
|
} |
431
|
|
|
|
432
|
|
|
if ((isset($SETTINGS['duplicate_item']) === true |
433
|
|
|
&& (int) $SETTINGS['duplicate_item'] === 0 |
434
|
|
|
&& (int) $itemExists === 0) |
435
|
|
|
|| (isset($SETTINGS['duplicate_item']) === true |
436
|
|
|
&& (int) $SETTINGS['duplicate_item'] === 1) |
437
|
|
|
) { |
438
|
|
|
// Handle case where pw is empty |
439
|
|
|
// if not allowed then warn user |
440
|
|
|
if (($session->has('user-create_item_without_password') && $session->has('user-create_item_without_password') && null !== $session->get('user-create_item_without_password') |
441
|
|
|
&& (int) $session->get('user-create_item_without_password') !== 1) || |
442
|
|
|
empty($post_password) === false || |
443
|
|
|
(int) $post_folder_is_personal === 1 |
444
|
|
|
) { |
445
|
|
|
// NEW ENCRYPTION |
446
|
|
|
$cryptedStuff = doDataEncryption($post_password); |
447
|
|
|
} else { |
448
|
|
|
$cryptedStuff['encrypted'] = ''; |
449
|
|
|
$cryptedStuff['objectKey'] = ''; |
450
|
|
|
} |
451
|
|
|
|
452
|
|
|
$post_password = $cryptedStuff['encrypted']; |
453
|
|
|
$post_password_key = $cryptedStuff['objectKey']; |
454
|
|
|
$itemFilesForTasks = []; |
455
|
|
|
$itemFieldsForTasks = []; |
456
|
|
|
|
457
|
|
|
// ADD item |
458
|
|
|
DB::insert( |
459
|
|
|
prefixTable('items'), |
460
|
|
|
array( |
461
|
|
|
'label' => $inputData['label'], |
462
|
|
|
'description' => $post_description, |
463
|
|
|
'pw' => $post_password, |
464
|
|
|
'pw_iv' => '', |
465
|
|
|
'pw_len' => $strlen_post_password, |
466
|
|
|
'email' => $post_email, |
467
|
|
|
'url' => $post_url, |
468
|
|
|
'id_tree' => $inputData['folderId'], |
469
|
|
|
'login' => $post_login, |
470
|
|
|
'inactif' => 0, |
471
|
|
|
'restricted_to' => empty($post_restricted_to) === true ? |
472
|
|
|
'' : (is_array($post_restricted_to) === true ? implode(';', $post_restricted_to) : $post_restricted_to), |
473
|
|
|
'perso' => ((int) $post_folder_is_personal === 1) ? |
474
|
|
|
1 : 0, |
475
|
|
|
'anyone_can_modify' => ($post_anyone_can_modify === 'on') ? 1 : 0, |
476
|
|
|
'complexity_level' => $post_complexity_level, |
477
|
|
|
'encryption_type' => 'teampass_aes', |
478
|
|
|
'fa_icon' => $post_fa_icon, |
479
|
|
|
'item_key' => uniqidReal(50), |
480
|
|
|
'created_at' => time(), |
481
|
|
|
) |
482
|
|
|
); |
483
|
|
|
$newID = DB::insertId(); |
484
|
|
|
|
485
|
|
|
// Create sharekeys for the user itself |
486
|
|
|
storeUsersShareKey( |
487
|
|
|
prefixTable('sharekeys_items'), |
488
|
|
|
(int) $post_folder_is_personal, |
489
|
|
|
(int) $newID, |
490
|
|
|
$cryptedStuff['objectKey'], |
491
|
|
|
true, // only for the item creator |
492
|
|
|
false, // no delete all |
493
|
|
|
); |
494
|
|
|
|
495
|
|
|
// update fields |
496
|
|
|
if ( |
497
|
|
|
isset($SETTINGS['item_extra_fields']) === true |
498
|
|
|
&& (int) $SETTINGS['item_extra_fields'] === 1 |
499
|
|
|
) { |
500
|
|
|
foreach ($post_fields as $field) { |
501
|
|
|
if (empty($field['value']) === false) { |
502
|
|
|
// should we encrypt the data |
503
|
|
|
$dataTmp = DB::queryFirstRow( |
504
|
|
|
'SELECT encrypted_data |
505
|
|
|
FROM ' . prefixTable('categories') . ' |
506
|
|
|
WHERE id = %i', |
507
|
|
|
$field['id'] |
508
|
|
|
); |
509
|
|
|
|
510
|
|
|
// Should we encrypt the data |
511
|
|
|
if ((int) $dataTmp['encrypted_data'] === 1) { |
512
|
|
|
// Create sharekeys for users |
513
|
|
|
$cryptedStuff = doDataEncryption($field['value']); |
514
|
|
|
|
515
|
|
|
// Store value |
516
|
|
|
DB::insert( |
517
|
|
|
prefixTable('categories_items'), |
518
|
|
|
array( |
519
|
|
|
'item_id' => $newID, |
520
|
|
|
'field_id' => $field['id'], |
521
|
|
|
'data' => $cryptedStuff['encrypted'], |
522
|
|
|
'data_iv' => '', |
523
|
|
|
'encryption_type' => TP_ENCRYPTION_NAME, |
524
|
|
|
) |
525
|
|
|
); |
526
|
|
|
$newObjectId = DB::insertId(); |
527
|
|
|
|
528
|
|
|
// Create sharekeys for user |
529
|
|
|
storeUsersShareKey( |
530
|
|
|
prefixTable('sharekeys_fields'), |
531
|
|
|
(int) $post_folder_is_personal, |
532
|
|
|
(int) $newObjectId, |
533
|
|
|
$cryptedStuff['objectKey'], |
534
|
|
|
true, // only for the item creator |
535
|
|
|
false, // no delete all |
536
|
|
|
); |
537
|
|
|
|
538
|
|
|
array_push( |
539
|
|
|
$itemFieldsForTasks, |
540
|
|
|
[ |
541
|
|
|
'object_id' => $newObjectId, |
542
|
|
|
'object_key' => $cryptedStuff['objectKey'], |
543
|
|
|
] |
544
|
|
|
); |
545
|
|
|
|
546
|
|
|
} else { |
547
|
|
|
// update value |
548
|
|
|
DB::insert( |
549
|
|
|
prefixTable('categories_items'), |
550
|
|
|
array( |
551
|
|
|
'item_id' => $newID, |
552
|
|
|
'field_id' => $field['id'], |
553
|
|
|
'data' => $field['value'], |
554
|
|
|
'data_iv' => '', |
555
|
|
|
'encryption_type' => 'not_set', |
556
|
|
|
) |
557
|
|
|
); |
558
|
|
|
} |
559
|
|
|
} |
560
|
|
|
} |
561
|
|
|
} |
562
|
|
|
|
563
|
|
|
// If template enable, is there a main one selected? |
564
|
|
|
if ( |
565
|
|
|
isset($SETTINGS['item_creation_templates']) === true |
566
|
|
|
&& (int) $SETTINGS['item_creation_templates'] === 1 |
567
|
|
|
&& empty($post_template_id) === false |
568
|
|
|
) { |
569
|
|
|
DB::queryFirstRow( |
570
|
|
|
'SELECT * |
571
|
|
|
FROM ' . prefixTable('templates') . ' |
572
|
|
|
WHERE item_id = %i', |
573
|
|
|
$newID |
574
|
|
|
); |
575
|
|
|
if (DB::count() === 0) { |
576
|
|
|
// store field text |
577
|
|
|
DB::insert( |
578
|
|
|
prefixTable('templates'), |
579
|
|
|
array( |
580
|
|
|
'item_id' => $newID, |
581
|
|
|
'category_id' => $post_template_id, |
582
|
|
|
) |
583
|
|
|
); |
584
|
|
|
} else { |
585
|
|
|
// Delete if empty |
586
|
|
|
if (empty($post_template_id) === true) { |
587
|
|
|
DB::delete( |
588
|
|
|
prefixTable('templates'), |
589
|
|
|
'item_id = %i', |
590
|
|
|
$newID |
591
|
|
|
); |
592
|
|
|
} else { |
593
|
|
|
// Update value |
594
|
|
|
DB::update( |
595
|
|
|
prefixTable('templates'), |
596
|
|
|
array( |
597
|
|
|
'category_id' => $post_template_id, |
598
|
|
|
), |
599
|
|
|
'item_id = %i', |
600
|
|
|
$newID |
601
|
|
|
); |
602
|
|
|
} |
603
|
|
|
} |
604
|
|
|
} |
605
|
|
|
|
606
|
|
|
// If automatic deletion asked |
607
|
|
|
if ( |
608
|
|
|
isset($SETTINGS['enable_delete_after_consultation']) === true |
609
|
|
|
&& (int) $SETTINGS['enable_delete_after_consultation'] === 1 |
610
|
|
|
&& is_null($post_to_be_deleted_after_x_views) === false |
611
|
|
|
&& is_null($post_to_be_deleted_after_date) === false |
612
|
|
|
) { |
613
|
|
|
if ( |
614
|
|
|
empty($post_to_be_deleted_after_date) === false |
615
|
|
|
|| $post_to_be_deleted_after_x_views > 0 |
616
|
|
|
) { |
617
|
|
|
// Automatic deletion to be added |
618
|
|
|
DB::insert( |
619
|
|
|
prefixTable('automatic_del'), |
620
|
|
|
array( |
621
|
|
|
'item_id' => $newID, |
622
|
|
|
'del_enabled' => 1, |
623
|
|
|
'del_type' => $post_to_be_deleted_after_x_views > 0 ? 1 : 2, //1 = numeric : 2 = date |
624
|
|
|
'del_value' => $post_to_be_deleted_after_x_views > 0 ? $post_to_be_deleted_after_x_views : dateToStamp($post_to_be_deleted_after_date, $SETTINGS['date_format']), |
625
|
|
|
) |
626
|
|
|
); |
627
|
|
|
} |
628
|
|
|
} |
629
|
|
|
|
630
|
|
|
// Get readable list of restriction |
631
|
|
|
$listOfRestricted = $oldRestrictionList = ''; |
632
|
|
|
if ( |
633
|
|
|
is_array($post_restricted_to) === true |
634
|
|
|
&& count($post_restricted_to) > 0 |
635
|
|
|
&& isset($SETTINGS['restricted_to']) === true |
636
|
|
|
&& (int) $SETTINGS['restricted_to'] === 1 |
637
|
|
|
) { |
638
|
|
|
foreach ($post_restricted_to as $userRest) { |
639
|
|
|
if (empty($userRest) === false) { |
640
|
|
|
$dataTmp = DB::queryFirstRow('SELECT login FROM ' . prefixTable('users') . ' WHERE id= %i', $userRest); |
641
|
|
|
if (empty($listOfRestricted)) { |
642
|
|
|
$listOfRestricted = $dataTmp['login']; |
643
|
|
|
} else { |
644
|
|
|
$listOfRestricted .= ';' . $dataTmp['login']; |
645
|
|
|
} |
646
|
|
|
} |
647
|
|
|
} |
648
|
|
|
} |
649
|
|
|
if ( |
650
|
|
|
$post_restricted_to !== null |
651
|
|
|
&& $data !== null |
652
|
|
|
&& $data['restricted_to'] !== $post_restricted_to |
653
|
|
|
&& (int) $SETTINGS['restricted_to'] === 1 |
654
|
|
|
) { |
655
|
|
|
if (empty($data['restricted_to']) === false) { |
656
|
|
|
foreach (explode(';', $data['restricted_to']) as $userRest) { |
657
|
|
|
if (empty($userRest) === false) { |
658
|
|
|
$dataTmp = DB::queryFirstRow( |
659
|
|
|
'SELECT login |
660
|
|
|
FROM ' . prefixTable('users') . ' |
661
|
|
|
WHERE id= %i', |
662
|
|
|
$userRest |
663
|
|
|
); |
664
|
|
|
|
665
|
|
|
if (empty($oldRestrictionList) === true) { |
666
|
|
|
$oldRestrictionList = $dataTmp['login']; |
667
|
|
|
} else { |
668
|
|
|
$oldRestrictionList .= ';' . $dataTmp['login']; |
669
|
|
|
} |
670
|
|
|
} |
671
|
|
|
} |
672
|
|
|
} |
673
|
|
|
} |
674
|
|
|
// Manage retriction_to_roles |
675
|
|
|
if ( |
676
|
|
|
is_array($post_restricted_to_roles) === true |
677
|
|
|
&& count($post_restricted_to_roles) > 0 |
678
|
|
|
&& isset($SETTINGS['restricted_to_roles']) === true |
679
|
|
|
&& (int) $SETTINGS['restricted_to_roles'] === 1 |
680
|
|
|
) { |
681
|
|
|
// add roles for item |
682
|
|
|
if ( |
683
|
|
|
is_array($post_restricted_to_roles) === true |
684
|
|
|
&& count($post_restricted_to_roles) > 0 |
685
|
|
|
) { |
686
|
|
|
foreach ($post_restricted_to_roles as $role) { |
687
|
|
|
if (count($role) > 1) { |
688
|
|
|
$role = $role[1]; |
689
|
|
|
} else { |
690
|
|
|
$role = $role[0]; |
691
|
|
|
} |
692
|
|
|
DB::insert( |
693
|
|
|
prefixTable('restriction_to_roles'), |
694
|
|
|
array( |
695
|
|
|
'role_id' => $role, |
696
|
|
|
'item_id' => $inputData['itemId'], |
697
|
|
|
) |
698
|
|
|
); |
699
|
|
|
} |
700
|
|
|
} |
701
|
|
|
} |
702
|
|
|
|
703
|
|
|
// log |
704
|
|
|
logItems( |
705
|
|
|
$SETTINGS, |
706
|
|
|
(int) $newID, |
707
|
|
|
$inputData['label'], |
708
|
|
|
$session->get('user-id'), |
709
|
|
|
'at_creation', |
710
|
|
|
$session->get('user-login') |
711
|
|
|
); |
712
|
|
|
|
713
|
|
|
// Add tags |
714
|
|
|
$tags = explode(' ', $post_tags); |
715
|
|
|
foreach ($tags as $tag) { |
716
|
|
|
if (empty($tag) === false) { |
717
|
|
|
DB::insert( |
718
|
|
|
prefixTable('tags'), |
719
|
|
|
array( |
720
|
|
|
'item_id' => $newID, |
721
|
|
|
'tag' => strtolower($tag), |
722
|
|
|
) |
723
|
|
|
); |
724
|
|
|
} |
725
|
|
|
} |
726
|
|
|
|
727
|
|
|
// Check if any files have been added |
728
|
|
|
if (empty($post_uploaded_file_id) === false) { |
729
|
|
|
$rows = DB::query( |
730
|
|
|
'SELECT id |
731
|
|
|
FROM ' . prefixTable('files') . ' |
732
|
|
|
WHERE id_item = %s', |
733
|
|
|
$post_uploaded_file_id |
734
|
|
|
); |
735
|
|
|
foreach ($rows as $record) { |
736
|
|
|
// update item_id in files table |
737
|
|
|
DB::update( |
738
|
|
|
prefixTable('files'), |
739
|
|
|
array( |
740
|
|
|
'id_item' => $newID, |
741
|
|
|
'confirmed' => 1, |
742
|
|
|
), |
743
|
|
|
'id=%i', |
744
|
|
|
$record['id'] |
745
|
|
|
); |
746
|
|
|
} |
747
|
|
|
} |
748
|
|
|
|
749
|
|
|
// Create new task for the new item |
750
|
|
|
// If it is not a personnal one |
751
|
|
|
if ((int) $post_folder_is_personal === 0) { |
752
|
|
|
storeTask( |
753
|
|
|
'new_item', |
754
|
|
|
$session->get('user-id'), |
755
|
|
|
0, |
756
|
|
|
(int) $inputData['folderId'], |
757
|
|
|
(int) $newID, |
758
|
|
|
$post_password_key, |
759
|
|
|
$itemFieldsForTasks, |
760
|
|
|
$itemFilesForTasks, |
761
|
|
|
); |
762
|
|
|
} |
763
|
|
|
|
764
|
|
|
// Announce by email? |
765
|
|
|
if (empty($post_diffusion_list) === false) { |
766
|
|
|
// get links url |
767
|
|
|
if (empty($SETTINGS['email_server_url'])) { |
768
|
|
|
$SETTINGS['email_server_url'] = $SETTINGS['cpassman_url']; |
769
|
|
|
} |
770
|
|
|
|
771
|
|
|
// Get path |
772
|
|
|
$path = geItemReadablePath( |
773
|
|
|
(int) $inputData['folderId'], |
774
|
|
|
$inputData['label'], |
775
|
|
|
$SETTINGS |
776
|
|
|
); |
777
|
|
|
|
778
|
|
|
// send email |
779
|
|
|
if (is_array($post_diffusion_list) === true && count($post_diffusion_list) > 0) { |
780
|
|
|
$cpt = 0; |
781
|
|
|
foreach ($post_diffusion_list as $emailAddress) { |
782
|
|
|
if (empty($emailAddress) === false) { |
783
|
|
|
prepareSendingEmail( |
784
|
|
|
$lang->get('email_subject_item_updated'), |
785
|
|
|
str_replace( |
786
|
|
|
array('#label', '#link'), |
787
|
|
|
array($path, $SETTINGS['email_server_url'] . '/index.php?page=items&group=' . $inputData['folderId'] . '&id=' . $newID . $lang['email_body3']), |
788
|
|
|
$lang->get('new_item_email_body') |
789
|
|
|
), |
790
|
|
|
$emailAddress, |
791
|
|
|
$post_diffusion_list_names[$cpt] |
792
|
|
|
); |
793
|
|
|
} |
794
|
|
|
$cpt++; |
795
|
|
|
} |
796
|
|
|
} |
797
|
|
|
} |
798
|
|
|
} elseif ( |
799
|
|
|
isset($SETTINGS['duplicate_item']) === true |
800
|
|
|
&& (int) $SETTINGS['duplicate_item'] === 0 |
801
|
|
|
&& (int) $itemExists === 1 |
802
|
|
|
) { |
803
|
|
|
// Encrypt data to return |
804
|
|
|
echo (string) prepareExchangedData( |
805
|
|
|
array( |
806
|
|
|
'error' => true, |
807
|
|
|
'message' => $lang->get('error_item_exists'), |
808
|
|
|
), |
809
|
|
|
'encode' |
810
|
|
|
); |
811
|
|
|
break; |
812
|
|
|
} |
813
|
|
|
|
814
|
|
|
// Add item to CACHE table if new item has been created |
815
|
|
|
if (isset($newID) === true) { |
816
|
|
|
updateCacheTable('add_value', (int) $newID); |
817
|
|
|
} |
818
|
|
|
|
819
|
|
|
$arrData = array( |
820
|
|
|
'error' => false, |
821
|
|
|
'item_id' => $newID, |
822
|
|
|
); |
823
|
|
|
} else { |
824
|
|
|
// an error appears on JSON format |
825
|
|
|
echo (string) prepareExchangedData( |
826
|
|
|
array( |
827
|
|
|
'error' => true, |
828
|
|
|
'message' => $lang->get('json_error_format'), |
829
|
|
|
), |
830
|
|
|
'encode' |
831
|
|
|
); |
832
|
|
|
} |
833
|
|
|
|
834
|
|
|
// Encrypt data to return |
835
|
|
|
echo (string) prepareExchangedData( |
836
|
|
|
$arrData, |
837
|
|
|
'encode' |
838
|
|
|
); |
839
|
|
|
break; |
840
|
|
|
|
841
|
|
|
/* |
842
|
|
|
* CASE |
843
|
|
|
* update an ITEM |
844
|
|
|
*/ |
845
|
|
|
case 'update_item': |
846
|
|
|
// Check KEY and rights |
847
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
848
|
|
|
echo (string) prepareExchangedData( |
849
|
|
|
array( |
850
|
|
|
'error' => true, |
851
|
|
|
'message' => $lang->get('key_is_not_correct'), |
852
|
|
|
), |
853
|
|
|
'encode' |
854
|
|
|
); |
855
|
|
|
break; |
856
|
|
|
} |
857
|
|
|
if ($session->get('user-read_only') === 1) { |
858
|
|
|
echo (string) prepareExchangedData( |
859
|
|
|
array( |
860
|
|
|
'error' => true, |
861
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
862
|
|
|
), |
863
|
|
|
'encode' |
864
|
|
|
); |
865
|
|
|
break; |
866
|
|
|
} |
867
|
|
|
|
868
|
|
|
// init |
869
|
|
|
$returnValues = array(); |
870
|
|
|
// decrypt and retreive data in JSON format |
871
|
|
|
$dataReceived = prepareExchangedData( |
872
|
|
|
$inputData['data'], |
873
|
|
|
'decode' |
874
|
|
|
); |
875
|
|
|
|
876
|
|
|
// Error if not expected data |
877
|
|
|
if (is_array($dataReceived) === false || count($dataReceived) === 0) { |
878
|
|
|
echo (string) prepareExchangedData( |
879
|
|
|
array( |
880
|
|
|
'error' => true, |
881
|
|
|
'message' => $lang->get('json_error_format'), |
882
|
|
|
), |
883
|
|
|
'encode' |
884
|
|
|
); |
885
|
|
|
break; |
886
|
|
|
} |
887
|
|
|
|
888
|
|
|
// Prepare variables |
889
|
|
|
$itemInfos = array(); |
890
|
|
|
$inputData['label'] = isset($dataReceived['label']) && is_string($dataReceived['label']) ? filter_var($dataReceived['label'], FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
891
|
|
|
$post_url = isset($dataReceived['url'])=== true ? filter_var(htmlspecialchars_decode($dataReceived['url']), FILTER_SANITIZE_URL) : ''; |
892
|
|
|
$post_password = $original_pw = isset($dataReceived['pw']) && is_string($dataReceived['pw']) ? htmlspecialchars_decode($dataReceived['pw']) : ''; |
893
|
|
|
$post_login = isset($dataReceived['login']) && is_string($dataReceived['login']) ? filter_var(htmlspecialchars_decode($dataReceived['login']), FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
894
|
|
|
$post_tags = isset($dataReceived['tags'])=== true ? htmlspecialchars($dataReceived['tags']) : ''; |
895
|
|
|
$post_email = isset($dataReceived['email'])=== true ? filter_var(htmlspecialchars_decode($dataReceived['email']), FILTER_SANITIZE_EMAIL) : ''; |
896
|
|
|
$post_template_id = (int) filter_var($dataReceived['template_id'], FILTER_SANITIZE_NUMBER_INT); |
897
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['id'], FILTER_SANITIZE_NUMBER_INT); |
898
|
|
|
$post_anyone_can_modify = (int) filter_var($dataReceived['anyone_can_modify'], FILTER_SANITIZE_NUMBER_INT); |
899
|
|
|
$post_complexity_level = (int) filter_var($dataReceived['complexity_level'], FILTER_SANITIZE_NUMBER_INT); |
900
|
|
|
$inputData['folderId'] = (int) filter_var($dataReceived['folder'], FILTER_SANITIZE_NUMBER_INT); |
901
|
|
|
$post_folder_is_personal = (int) filter_var($dataReceived['folder_is_personal'], FILTER_SANITIZE_NUMBER_INT); |
902
|
|
|
$post_restricted_to = filter_var_array( |
903
|
|
|
$dataReceived['restricted_to'], |
904
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
905
|
|
|
); |
906
|
|
|
$post_restricted_to_roles = filter_var_array( |
907
|
|
|
$dataReceived['restricted_to_roles'], |
908
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
909
|
|
|
); |
910
|
|
|
$post_diffusion_list = filter_var_array( |
911
|
|
|
$dataReceived['diffusion_list'], |
912
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
913
|
|
|
); |
914
|
|
|
$post_diffusion_list_names = filter_var_array( |
915
|
|
|
$dataReceived['diffusion_list_names'], |
916
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
917
|
|
|
); |
918
|
|
|
//$post_diffusion_list_names = $post_diffusion_list_names !== false ? json_decode($post_diffusion_list_names) : ''; |
919
|
|
|
$post_to_be_deleted_after_x_views = filter_var( |
920
|
|
|
$dataReceived['to_be_deleted_after_x_views'], |
921
|
|
|
FILTER_SANITIZE_NUMBER_INT |
922
|
|
|
); |
923
|
|
|
$post_to_be_deleted_after_date = isset($dataReceived['to_be_deleted_after_date']) === true ? filter_var( |
924
|
|
|
$dataReceived['to_be_deleted_after_date'], |
925
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
926
|
|
|
) : |
927
|
|
|
''; |
928
|
|
|
$post_fields = (filter_var_array( |
929
|
|
|
$dataReceived['fields'], |
930
|
|
|
FILTER_SANITIZE_FULL_SPECIAL_CHARS |
931
|
|
|
)); |
932
|
|
|
$post_description = $antiXss->xss_clean($dataReceived['description']); |
933
|
|
|
$post_fa_icon = isset($dataReceived['fa_icon']) === true ? filter_var(($dataReceived['fa_icon']), FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
934
|
|
|
$post_otp_is_enabled = (int) filter_var($dataReceived['otp_is_enabled'], FILTER_SANITIZE_NUMBER_INT); |
935
|
|
|
$post_otp_phone_number = (int) filter_var($dataReceived['otp_phone_number'], FILTER_SANITIZE_NUMBER_INT); |
936
|
|
|
$post_otp_secret = isset($dataReceived['otp_secret']) === true ? filter_var(($dataReceived['otp_secret']), FILTER_SANITIZE_FULL_SPECIAL_CHARS) : ''; |
937
|
|
|
|
938
|
|
|
//-> DO A SET OF CHECKS |
939
|
|
|
// Perform a check in case of Read-Only user creating an item in his PF |
940
|
|
|
if ( |
941
|
|
|
$session->get('user-read_only') === 1 |
942
|
|
|
&& (in_array($inputData['folderId'], $session->get('user-personal_folders')) === false |
943
|
|
|
|| $post_folder_is_personal !== 1) |
944
|
|
|
) { |
945
|
|
|
echo (string) prepareExchangedData( |
946
|
|
|
array( |
947
|
|
|
'error' => true, |
948
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
949
|
|
|
), |
950
|
|
|
'encode' |
951
|
|
|
); |
952
|
|
|
break; |
953
|
|
|
} |
954
|
|
|
|
955
|
|
|
$dataCheck = validateDataFields(prefixTable('items'), $dataReceived); |
956
|
|
|
if ($dataCheck['state'] !== true) { |
957
|
|
|
echo (string) prepareExchangedData( |
958
|
|
|
array( |
959
|
|
|
'error' => true, |
960
|
|
|
'message' => $lang->get('error_data_not_valid').' - '.$lang->get('field').' '.strtoupper($dataCheck['field']).' '.$lang->get('exceeds_maximum_length_of').' '.$dataCheck['maxLength'].' ('.$dataCheck['currentLength'].')', |
961
|
|
|
), |
962
|
|
|
'encode' |
963
|
|
|
); |
964
|
|
|
break; |
965
|
|
|
} |
966
|
|
|
|
967
|
|
|
// Check PWD EMPTY |
968
|
|
|
if ( |
969
|
|
|
empty($pw) |
970
|
|
|
&& $session->has('user-create_item_without_password') && null !== $session->get('user-create_item_without_password') |
971
|
|
|
&& (int) $session->get('user-create_item_without_password') !== 1 |
972
|
|
|
) { |
973
|
|
|
echo (string) prepareExchangedData( |
974
|
|
|
array( |
975
|
|
|
'error' => true, |
976
|
|
|
'message' => $lang->get('error_pw'), |
977
|
|
|
), |
978
|
|
|
'encode' |
979
|
|
|
); |
980
|
|
|
break; |
981
|
|
|
} |
982
|
|
|
|
983
|
|
|
// Need info in DB |
984
|
|
|
// About special settings |
985
|
|
|
$dataFolderSettings = DB::queryFirstRow( |
986
|
|
|
'SELECT bloquer_creation, bloquer_modification, personal_folder, title |
987
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
988
|
|
|
WHERE id = %i', |
989
|
|
|
$inputData['folderId'] |
990
|
|
|
); |
991
|
|
|
$itemInfos['personal_folder'] = (int) $dataFolderSettings['personal_folder']; |
992
|
|
|
if ((int) $itemInfos['personal_folder'] === 1) { |
993
|
|
|
$itemInfos['no_complex_check_on_modification'] = 1; |
994
|
|
|
$itemInfos['no_complex_check_on_creation'] = 1; |
995
|
|
|
} else { |
996
|
|
|
$itemInfos['no_complex_check_on_modification'] = (int) $dataFolderSettings['bloquer_modification']; |
997
|
|
|
$itemInfos['no_complex_check_on_creation'] = (int) $dataFolderSettings['bloquer_creation']; |
998
|
|
|
} |
999
|
|
|
|
1000
|
|
|
// Get folder complexity |
1001
|
|
|
$folderComplexity = DB::queryFirstRow( |
1002
|
|
|
'SELECT valeur |
1003
|
|
|
FROM ' . prefixTable('misc') . ' |
1004
|
|
|
WHERE type = %s AND intitule = %i', |
1005
|
|
|
'complex', |
1006
|
|
|
$inputData['folderId'] |
1007
|
|
|
); |
1008
|
|
|
$itemInfos['requested_folder_complexity'] = is_null($folderComplexity) === false ? (int) $folderComplexity['valeur'] : 0; |
1009
|
|
|
// Check COMPLEXITY |
1010
|
|
|
if ($post_complexity_level < $itemInfos['requested_folder_complexity'] && $itemInfos['no_complex_check_on_modification'] === 0) { |
1011
|
|
|
echo (string) prepareExchangedData( |
1012
|
|
|
array( |
1013
|
|
|
'error' => true, |
1014
|
|
|
'message' => $lang->get('error_security_level_not_reached'), |
1015
|
|
|
), |
1016
|
|
|
'encode' |
1017
|
|
|
); |
1018
|
|
|
break; |
1019
|
|
|
} |
1020
|
|
|
|
1021
|
|
|
// Check password length |
1022
|
|
|
$strlen_post_password = strlen($post_password); |
1023
|
|
|
if ($strlen_post_password > $SETTINGS['pwd_maximum_length']) { |
1024
|
|
|
echo (string) prepareExchangedData( |
1025
|
|
|
array( |
1026
|
|
|
'error' => true, |
1027
|
|
|
'message' => $lang->get('error_pw_too_long'), |
1028
|
|
|
), |
1029
|
|
|
'encode' |
1030
|
|
|
); |
1031
|
|
|
break; |
1032
|
|
|
} |
1033
|
|
|
|
1034
|
|
|
// ./ END |
1035
|
|
|
|
1036
|
|
|
// Init |
1037
|
|
|
$arrayOfChanges = array(); |
1038
|
|
|
$encryptionTaskIsRequested = false; |
1039
|
|
|
$itemFilesForTasks = []; |
1040
|
|
|
$itemFieldsForTasks = []; |
1041
|
|
|
$tasksToBePerformed = []; |
1042
|
|
|
$encrypted_password = ''; |
1043
|
|
|
$encrypted_password_key = ''; |
1044
|
|
|
|
1045
|
|
|
// Get all informations for this item |
1046
|
|
|
$dataItem = DB::queryFirstRow( |
1047
|
|
|
'SELECT * |
1048
|
|
|
FROM ' . prefixTable('items') . ' as i |
1049
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
1050
|
|
|
WHERE i.id=%i AND l.action = %s', |
1051
|
|
|
$inputData['itemId'], |
1052
|
|
|
'at_creation' |
1053
|
|
|
); |
1054
|
|
|
|
1055
|
|
|
// Always check what rights user has on requested folder |
1056
|
|
|
$checkRights = getCurrentAccessRights( |
1057
|
|
|
$session->get('user-id'), |
1058
|
|
|
$inputData['itemId'], |
1059
|
|
|
$inputData['folderId'], |
1060
|
|
|
); |
1061
|
|
|
|
1062
|
|
|
// If source and destination folder are different -> move item |
1063
|
|
|
if ((int) $dataItem['id_tree'] !== $inputData['folderId']) { |
1064
|
|
|
// Check that user can delete on old folder |
1065
|
|
|
if ($checkRights['error'] || !$checkRights['delete']) { |
1066
|
|
|
echo (string) prepareExchangedData( |
1067
|
|
|
array( |
1068
|
|
|
'error' => true, |
1069
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
1070
|
|
|
), |
1071
|
|
|
'encode' |
1072
|
|
|
); |
1073
|
|
|
break; |
1074
|
|
|
} |
1075
|
|
|
} |
1076
|
|
|
|
1077
|
|
|
if ($checkRights['error'] || !$checkRights['edit']) { |
1078
|
|
|
echo (string) prepareExchangedData( |
1079
|
|
|
array( |
1080
|
|
|
'error' => true, |
1081
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
1082
|
|
|
), |
1083
|
|
|
'encode' |
1084
|
|
|
); |
1085
|
|
|
break; |
1086
|
|
|
} |
1087
|
|
|
|
1088
|
|
|
// Does the user has the sharekey |
1089
|
|
|
//db::debugmode(true); |
1090
|
|
|
DB::query( |
1091
|
|
|
'SELECT * |
1092
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
1093
|
|
|
WHERE object_id = %i AND user_id = %s', |
1094
|
|
|
$inputData['itemId'], |
1095
|
|
|
$session->get('user-id') |
1096
|
|
|
); |
1097
|
|
|
if (DB::count() === 0) { |
1098
|
|
|
if (defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
1099
|
|
|
error_log('TEAMPASS | user '.$session->get('user-id').' has no sharekey for item '.$inputData['itemId']); |
1100
|
|
|
} |
1101
|
|
|
echo (string) prepareExchangedData( |
1102
|
|
|
array( |
1103
|
|
|
'error' => true, |
1104
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
1105
|
|
|
), |
1106
|
|
|
'encode' |
1107
|
|
|
); |
1108
|
|
|
break; |
1109
|
|
|
} |
1110
|
|
|
|
1111
|
|
|
// check that actual user can access this item |
1112
|
|
|
$restrictionActive = true; |
1113
|
|
|
$restrictedTo = is_null($dataItem['restricted_to']) === false ? array_filter(explode(';', $dataItem['restricted_to'])) : []; |
1114
|
|
|
if (in_array($session->get('user-id'), $restrictedTo) === true) { |
1115
|
|
|
$restrictionActive = false; |
1116
|
|
|
} |
1117
|
|
|
if (empty($dataItem['restricted_to']) === true) { |
1118
|
|
|
$restrictionActive = false; |
1119
|
|
|
} |
1120
|
|
|
|
1121
|
|
|
// DO init |
1122
|
|
|
$listOfRestricted = $oldRestrictionList = ''; |
1123
|
|
|
$arrayOfUsersRestriction = []; |
1124
|
|
|
$arrayOfUsersIdRestriction = []; |
1125
|
|
|
$diffUsersRestiction = []; |
1126
|
|
|
$diffRolesRestiction = []; |
1127
|
|
|
$arrayOfRestrictionRoles = []; |
1128
|
|
|
|
1129
|
|
|
$session__list_restricted_folders_for_items = $session->get('system-list_restricted_folders_for_items') ?? []; |
1130
|
|
|
if ((in_array($dataItem['id_tree'], $session->get('user-accessible_folders')) === true |
1131
|
|
|
&& ((int) $dataItem['perso'] === 0 |
1132
|
|
|
|| ((int) $dataItem['perso'] === 1 |
1133
|
|
|
//&& (int) $session->get('user-id') === (int) $dataItem['id_user'])) |
1134
|
|
|
)) |
1135
|
|
|
&& $restrictionActive === false) |
1136
|
|
|
|| (isset($SETTINGS['anyone_can_modify']) === true |
1137
|
|
|
&& (int) $SETTINGS['anyone_can_modify'] === 1 |
1138
|
|
|
&& (int) $dataItem['anyone_can_modify'] === 1 |
1139
|
|
|
&& (in_array($dataItem['id_tree'], $session->get('user-accessible_folders')) === true |
1140
|
|
|
|| (int) $session->get('user-admin') === 1) |
1141
|
|
|
&& $restrictionActive === false) |
1142
|
|
|
|| (null !== $inputData['folderId'] |
1143
|
|
|
&& count($session__list_restricted_folders_for_items) > 0 |
1144
|
|
|
&& in_array($inputData['id'], $session__list_restricted_folders_for_items[$inputData['folderId']]) === true |
1145
|
|
|
&& $restrictionActive === false) |
1146
|
|
|
) { |
1147
|
|
|
// Get existing values |
1148
|
|
|
$data = DB::queryFirstRow( |
1149
|
|
|
'SELECT i.id as id, i.label as label, i.description as description, i.pw as pw, i.url as url, i.id_tree as id_tree, i.perso as perso, i.login as login, |
1150
|
|
|
i.inactif as inactif, i.restricted_to as restricted_to, i.anyone_can_modify as anyone_can_modify, i.email as email, i.notification as notification, |
1151
|
|
|
u.login as user_login, u.email as user_email |
1152
|
|
|
FROM ' . prefixTable('items') . ' as i |
1153
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (i.id=l.id_item) |
1154
|
|
|
INNER JOIN ' . prefixTable('users') . ' as u ON (u.id=l.id_user) |
1155
|
|
|
WHERE i.id=%i', |
1156
|
|
|
$inputData['itemId'] |
1157
|
|
|
); |
1158
|
|
|
|
1159
|
|
|
// Should we log a password change? |
1160
|
|
|
$userKey = DB::queryFirstRow( |
1161
|
|
|
'SELECT share_key |
1162
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
1163
|
|
|
WHERE user_id = %i AND object_id = %i', |
1164
|
|
|
$session->get('user-id'), |
1165
|
|
|
$inputData['itemId'] |
1166
|
|
|
); |
1167
|
|
|
if (DB::count() === 0 || empty($data['pw']) === true) { |
1168
|
|
|
// No share key found |
1169
|
|
|
$pw = ''; |
1170
|
|
|
} else { |
1171
|
|
|
$pw = base64_decode(doDataDecryption( |
1172
|
|
|
$data['pw'], |
1173
|
|
|
decryptUserObjectKey( |
1174
|
|
|
$userKey['share_key'], |
1175
|
|
|
$session->get('user-private_key') |
1176
|
|
|
) |
1177
|
|
|
)); |
1178
|
|
|
} |
1179
|
|
|
|
1180
|
|
|
if ($post_password !== $pw) { |
1181
|
|
|
// Encrypt previous pw |
1182
|
|
|
$previousValue = cryption( |
1183
|
|
|
$pw, |
1184
|
|
|
'', |
1185
|
|
|
'encrypt' |
1186
|
|
|
); |
1187
|
|
|
|
1188
|
|
|
// log the change of PW |
1189
|
|
|
logItems( |
1190
|
|
|
$SETTINGS, |
1191
|
|
|
(int) $inputData['itemId'], |
1192
|
|
|
$inputData['label'], |
1193
|
|
|
$session->get('user-id'), |
1194
|
|
|
'at_modification', |
1195
|
|
|
$session->get('user-login'), |
1196
|
|
|
'at_pw', |
1197
|
|
|
TP_ENCRYPTION_NAME, |
1198
|
|
|
NULL, |
1199
|
|
|
isset($previousValue['string']) === true ? $previousValue['string'] : '', |
1200
|
|
|
); |
1201
|
|
|
} |
1202
|
|
|
|
1203
|
|
|
// encrypt PW on if it has changed, or if it is empty |
1204
|
|
|
if ( |
1205
|
|
|
( |
1206
|
|
|
( |
1207
|
|
|
$session->has('user-create_item_without_password') |
1208
|
|
|
&& (int) $session->get('user-create_item_without_password') !== 1 |
1209
|
|
|
) |
1210
|
|
|
|| !empty($post_password) |
1211
|
|
|
) |
1212
|
|
|
&& $post_password !== $pw |
1213
|
|
|
) { |
1214
|
|
|
//----- |
1215
|
|
|
// NEW ENCRYPTION |
1216
|
|
|
$cryptedStuff = doDataEncryption($post_password); |
1217
|
|
|
$encrypted_password = $cryptedStuff['encrypted']; |
1218
|
|
|
$encrypted_password_key = $cryptedStuff['objectKey']; |
1219
|
|
|
|
1220
|
|
|
// Create sharekeys for users |
1221
|
|
|
storeUsersShareKey( |
1222
|
|
|
prefixTable('sharekeys_items'), |
1223
|
|
|
(int) $post_folder_is_personal, |
1224
|
|
|
(int) $inputData['itemId'], |
1225
|
|
|
$encrypted_password_key, |
1226
|
|
|
true, // only for the item creator |
1227
|
|
|
true, // delete all |
1228
|
|
|
); |
1229
|
|
|
|
1230
|
|
|
// Create a task to create sharekeys for users |
1231
|
|
|
if (WIP=== true) error_log('createTaskForItem - new password for this item - '.$post_password ." -- ". $pw); |
1232
|
|
|
$tasksToBePerformed = ['item_password']; |
1233
|
|
|
$encryptionTaskIsRequested = true; |
1234
|
|
|
} else { |
1235
|
|
|
$encrypted_password = $data['pw']; |
1236
|
|
|
} |
1237
|
|
|
|
1238
|
|
|
// ---Manage tags |
1239
|
|
|
// Get list of tags |
1240
|
|
|
$itemTags = DB::queryFirstColumn( |
1241
|
|
|
'SELECT tag |
1242
|
|
|
FROM ' . prefixTable('tags') . ' |
1243
|
|
|
WHERE item_id = %i', |
1244
|
|
|
$inputData['itemId'] |
1245
|
|
|
); |
1246
|
|
|
|
1247
|
|
|
// deleting existing tags for this item |
1248
|
|
|
DB::delete( |
1249
|
|
|
prefixTable('tags'), |
1250
|
|
|
'item_id = %i', |
1251
|
|
|
$inputData['itemId'] |
1252
|
|
|
); |
1253
|
|
|
|
1254
|
|
|
// Add new tags |
1255
|
|
|
$postArrayTags = []; |
1256
|
|
|
if (empty($post_tags) === false) { |
1257
|
|
|
$postArrayTags = explode(' ', $post_tags); |
1258
|
|
|
foreach ($postArrayTags as $tag) { |
1259
|
|
|
if (empty($tag) === false) { |
1260
|
|
|
// save in DB |
1261
|
|
|
DB::insert( |
1262
|
|
|
prefixTable('tags'), |
1263
|
|
|
array( |
1264
|
|
|
'item_id' => $inputData['itemId'], |
1265
|
|
|
'tag' => strtolower($tag), |
1266
|
|
|
) |
1267
|
|
|
); |
1268
|
|
|
} |
1269
|
|
|
} |
1270
|
|
|
} |
1271
|
|
|
|
1272
|
|
|
// Store LOG |
1273
|
|
|
if (count(array_diff($postArrayTags, $itemTags)) > 0) { |
1274
|
|
|
// Store updates performed |
1275
|
|
|
array_push( |
1276
|
|
|
$arrayOfChanges, |
1277
|
|
|
'tags' |
1278
|
|
|
); |
1279
|
|
|
|
1280
|
|
|
// update LOG |
1281
|
|
|
logItems( |
1282
|
|
|
$SETTINGS, |
1283
|
|
|
(int) $inputData['itemId'], |
1284
|
|
|
$inputData['label'], |
1285
|
|
|
$session->get('user-id'), |
1286
|
|
|
'at_modification', |
1287
|
|
|
$session->get('user-login'), |
1288
|
|
|
'at_tag : ' . implode(' ', $itemTags) . ' => ' . $post_tags |
1289
|
|
|
); |
1290
|
|
|
} |
1291
|
|
|
|
1292
|
|
|
// update item |
1293
|
|
|
DB::update( |
1294
|
|
|
prefixTable('items'), |
1295
|
|
|
array( |
1296
|
|
|
'label' => $inputData['label'], |
1297
|
|
|
'description' => $post_description, |
1298
|
|
|
'pw' => $encrypted_password, |
1299
|
|
|
'pw_len' => $strlen_post_password, |
1300
|
|
|
'email' => $post_email, |
1301
|
|
|
'login' => $post_login, |
1302
|
|
|
'url' => $post_url, |
1303
|
|
|
'id_tree' => $inputData['folderId'], |
1304
|
|
|
'restricted_to' => empty($post_restricted_to) === true || count($post_restricted_to) === 0 ? '' : implode(';', $post_restricted_to), |
1305
|
|
|
'anyone_can_modify' => (int) $post_anyone_can_modify, |
1306
|
|
|
'complexity_level' => (int) $post_complexity_level, |
1307
|
|
|
'encryption_type' => TP_ENCRYPTION_NAME, |
1308
|
|
|
'perso' => in_array($inputData['folderId'], $session->get('user-personal_folders')) === true ? 1 : 0, |
1309
|
|
|
'fa_icon' => $post_fa_icon, |
1310
|
|
|
'updated_at' => time(), |
1311
|
|
|
), |
1312
|
|
|
'id=%i', |
1313
|
|
|
$inputData['itemId'] |
1314
|
|
|
); |
1315
|
|
|
|
1316
|
|
|
// update fields |
1317
|
|
|
if ( |
1318
|
|
|
isset($SETTINGS['item_extra_fields']) === true |
1319
|
|
|
&& (int) $SETTINGS['item_extra_fields'] === 1 |
1320
|
|
|
&& empty($post_fields) === false |
1321
|
|
|
) { |
1322
|
|
|
foreach ($post_fields as $field) { |
1323
|
|
|
if (empty($field['value']) === false) { |
1324
|
|
|
$dataTmpCat = DB::queryFirstRow( |
1325
|
|
|
'SELECT c.id AS id, c.title AS title, i.data AS data, i.data_iv AS data_iv, |
1326
|
|
|
i.encryption_type AS encryption_type, c.encrypted_data AS encrypted_data, |
1327
|
|
|
c.masked AS masked, i.id AS field_item_id |
1328
|
|
|
FROM ' . prefixTable('categories_items') . ' AS i |
1329
|
|
|
INNER JOIN ' . prefixTable('categories') . ' AS c ON (i.field_id=c.id) |
1330
|
|
|
WHERE i.field_id = %i AND i.item_id = %i', |
1331
|
|
|
$field['id'], |
1332
|
|
|
$inputData['itemId'] |
1333
|
|
|
); |
1334
|
|
|
$cryptedStuff = []; |
1335
|
|
|
$encryptedFieldIsChanged = false; |
1336
|
|
|
|
1337
|
|
|
// store Field text in DB |
1338
|
|
|
if (DB::count() === 0) { |
1339
|
|
|
// The data for this field doesn't exist |
1340
|
|
|
// It has to be added |
1341
|
|
|
|
1342
|
|
|
// Perform new query |
1343
|
|
|
$dataTmpCat = DB::queryFirstRow( |
1344
|
|
|
'SELECT id, title, encrypted_data, masked |
1345
|
|
|
FROM ' . prefixTable('categories') . ' |
1346
|
|
|
WHERE id = %i', |
1347
|
|
|
$field['id'] |
1348
|
|
|
); |
1349
|
|
|
|
1350
|
|
|
// store field text |
1351
|
|
|
DB::insert( |
1352
|
|
|
prefixTable('categories_items'), |
1353
|
|
|
array( |
1354
|
|
|
'item_id' => $inputData['itemId'], |
1355
|
|
|
'field_id' => $field['id'], |
1356
|
|
|
'data' => $field['value'], |
1357
|
|
|
'data_iv' => '', |
1358
|
|
|
'encryption_type' => 'not_set', |
1359
|
|
|
) |
1360
|
|
|
); |
1361
|
|
|
|
1362
|
|
|
$newId = DB::insertId(); |
1363
|
|
|
$dataTmpCat['field_item_id'] = $newId; |
1364
|
|
|
|
1365
|
|
|
// Should we encrypt the data |
1366
|
|
|
if ((int) $dataTmpCat['encrypted_data'] === 1) { |
1367
|
|
|
$cryptedStuff = doDataEncryption($field['value']); |
1368
|
|
|
|
1369
|
|
|
// Create sharekeys for users |
1370
|
|
|
storeUsersShareKey( |
1371
|
|
|
prefixTable('sharekeys_fields'), |
1372
|
|
|
(int) $post_folder_is_personal, |
1373
|
|
|
(int) $newId, |
1374
|
|
|
$cryptedStuff['objectKey'], |
1375
|
|
|
true, // only for the item creator |
1376
|
|
|
true, // delete all |
1377
|
|
|
); |
1378
|
|
|
|
1379
|
|
|
// update value |
1380
|
|
|
DB::update( |
1381
|
|
|
prefixTable('categories_items'), |
1382
|
|
|
array( |
1383
|
|
|
'data' => $cryptedStuff['encrypted'], |
1384
|
|
|
'data_iv' => '', |
1385
|
|
|
'encryption_type' => TP_ENCRYPTION_NAME, |
1386
|
|
|
), |
1387
|
|
|
'id = %i', |
1388
|
|
|
$newId |
1389
|
|
|
); |
1390
|
|
|
|
1391
|
|
|
if ($encryptedFieldIsChanged === false) { |
1392
|
|
|
array_push( |
1393
|
|
|
$tasksToBePerformed, |
1394
|
|
|
'item_field' |
1395
|
|
|
); |
1396
|
|
|
$encryptedFieldIsChanged = true; |
1397
|
|
|
} |
1398
|
|
|
} else { |
1399
|
|
|
// update value |
1400
|
|
|
DB::update( |
1401
|
|
|
prefixTable('categories_items'), |
1402
|
|
|
array( |
1403
|
|
|
'data' => $field['value'], |
1404
|
|
|
'data_iv' => '', |
1405
|
|
|
'encryption_type' => 'not_set', |
1406
|
|
|
), |
1407
|
|
|
'id = %i', |
1408
|
|
|
$newId |
1409
|
|
|
); |
1410
|
|
|
} |
1411
|
|
|
|
1412
|
|
|
// Store updates performed |
1413
|
|
|
array_push( |
1414
|
|
|
$arrayOfChanges, |
1415
|
|
|
$dataTmpCat['title'] |
1416
|
|
|
); |
1417
|
|
|
|
1418
|
|
|
// update LOG |
1419
|
|
|
logItems( |
1420
|
|
|
$SETTINGS, |
1421
|
|
|
(int) $inputData['itemId'], |
1422
|
|
|
$inputData['label'], |
1423
|
|
|
$session->get('user-id'), |
1424
|
|
|
'at_modification', |
1425
|
|
|
$session->get('user-login'), |
1426
|
|
|
'at_field : ' . $dataTmpCat['title'] . ' : ' . $field['value'] |
1427
|
|
|
); |
1428
|
|
|
} else { |
1429
|
|
|
// Case where the field already exists |
1430
|
|
|
// compare the old and new value |
1431
|
|
|
if ($dataTmpCat['encryption_type'] !== 'not_set') { |
1432
|
|
|
// Get user sharekey for this field |
1433
|
|
|
$userKey = DB::queryFirstRow( |
1434
|
|
|
'SELECT share_key |
1435
|
|
|
FROM ' . prefixTable('sharekeys_fields') . ' |
1436
|
|
|
WHERE user_id = %i AND object_id = %i', |
1437
|
|
|
$session->get('user-id'), |
1438
|
|
|
$dataTmpCat['field_item_id'] |
1439
|
|
|
); |
1440
|
|
|
|
1441
|
|
|
// Decrypt the current value |
1442
|
|
|
if (DB::count() > 0) { |
1443
|
|
|
$oldVal = base64_decode(doDataDecryption( |
1444
|
|
|
$dataTmpCat['data'], |
1445
|
|
|
decryptUserObjectKey( |
1446
|
|
|
$userKey['share_key'], |
1447
|
|
|
$session->get('user-private_key') |
1448
|
|
|
) |
1449
|
|
|
)); |
1450
|
|
|
} else { |
1451
|
|
|
$oldVal = ''; |
1452
|
|
|
} |
1453
|
|
|
} else { |
1454
|
|
|
$oldVal = $dataTmpCat['data']; |
1455
|
|
|
} |
1456
|
|
|
|
1457
|
|
|
// Compare both values to see if any change was done |
1458
|
|
|
if ($field['value'] !== $oldVal) { |
1459
|
|
|
// The strings are different |
1460
|
|
|
$encrypt = []; |
1461
|
|
|
|
1462
|
|
|
// Should we encrypt the data |
1463
|
|
|
if ((int) $dataTmpCat['encrypted_data'] === 1) { |
1464
|
|
|
$cryptedStuff = doDataEncryption($field['value']); |
1465
|
|
|
$encrypt['string'] = $cryptedStuff['encrypted']; |
1466
|
|
|
$encrypt['type'] = TP_ENCRYPTION_NAME; |
1467
|
|
|
|
1468
|
|
|
// Create sharekeys for users |
1469
|
|
|
storeUsersShareKey( |
1470
|
|
|
prefixTable('sharekeys_fields'), |
1471
|
|
|
(int) $post_folder_is_personal, |
1472
|
|
|
(int) $dataTmpCat['field_item_id'], |
1473
|
|
|
$cryptedStuff['objectKey'], |
1474
|
|
|
true, // only for the item creator |
1475
|
|
|
true, // delete all |
1476
|
|
|
); |
1477
|
|
|
|
1478
|
|
|
if ($encryptedFieldIsChanged === false) { |
1479
|
|
|
array_push( |
1480
|
|
|
$tasksToBePerformed, |
1481
|
|
|
'item_field' |
1482
|
|
|
); |
1483
|
|
|
$encryptedFieldIsChanged = true; |
1484
|
|
|
} |
1485
|
|
|
} else { |
1486
|
|
|
$encrypt['string'] = $field['value']; |
1487
|
|
|
$encrypt['type'] = 'not_set'; |
1488
|
|
|
} |
1489
|
|
|
|
1490
|
|
|
// update value |
1491
|
|
|
DB::update( |
1492
|
|
|
prefixTable('categories_items'), |
1493
|
|
|
array( |
1494
|
|
|
'data' => $encrypt['string'], |
1495
|
|
|
'data_iv' => '', |
1496
|
|
|
'encryption_type' => $encrypt['type'], |
1497
|
|
|
), |
1498
|
|
|
'item_id = %i AND field_id = %i', |
1499
|
|
|
$inputData['itemId'], |
1500
|
|
|
$field['id'] |
1501
|
|
|
); |
1502
|
|
|
|
1503
|
|
|
// Store updates performed |
1504
|
|
|
array_push( |
1505
|
|
|
$arrayOfChanges, |
1506
|
|
|
$dataTmpCat['title'] |
1507
|
|
|
); |
1508
|
|
|
|
1509
|
|
|
// update LOG |
1510
|
|
|
logItems( |
1511
|
|
|
$SETTINGS, |
1512
|
|
|
(int) $inputData['itemId'], |
1513
|
|
|
$inputData['label'], |
1514
|
|
|
$session->get('user-id'), |
1515
|
|
|
'at_modification', |
1516
|
|
|
$session->get('user-login'), |
1517
|
|
|
'at_field : ' . $dataTmpCat['title'] . ' => ' . $oldVal |
1518
|
|
|
); |
1519
|
|
|
} |
1520
|
|
|
} |
1521
|
|
|
|
1522
|
|
|
// Create a task to create sharekeys for this field for users |
1523
|
|
|
// If this field is encrypted |
1524
|
|
|
if ((int) $dataTmpCat['encrypted_data'] === 1 && $encryptedFieldIsChanged === true) { |
1525
|
|
|
array_push( |
1526
|
|
|
$itemFieldsForTasks, |
1527
|
|
|
[ |
1528
|
|
|
'object_id' => $dataTmpCat['field_item_id'], |
1529
|
|
|
'object_key' => $cryptedStuff['objectKey'], |
1530
|
|
|
] |
1531
|
|
|
); |
1532
|
|
|
$encryptionTaskIsRequested = true; |
1533
|
|
|
} |
1534
|
|
|
} else { |
1535
|
|
|
// Case where field new value is empty |
1536
|
|
|
// then delete field |
1537
|
|
|
if (empty($field_data[1]) === true) { |
1538
|
|
|
DB::delete( |
1539
|
|
|
prefixTable('categories_items'), |
1540
|
|
|
'item_id = %i AND field_id = %s', |
1541
|
|
|
$inputData['itemId'], |
1542
|
|
|
$field['id'] |
1543
|
|
|
); |
1544
|
|
|
} |
1545
|
|
|
} |
1546
|
|
|
} |
1547
|
|
|
} |
1548
|
|
|
|
1549
|
|
|
// create a task for all fields updated |
1550
|
|
|
if ($encryptionTaskIsRequested === true) { |
1551
|
|
|
if (WIP === true) error_log('createTaskForItem - '.print_r($tasksToBePerformed, true)); |
1552
|
|
|
createTaskForItem( |
1553
|
|
|
'item_update_create_keys', |
1554
|
|
|
array_unique($tasksToBePerformed), |
1555
|
|
|
(int) $inputData['itemId'], |
1556
|
|
|
(int) $session->get('user-id'), |
1557
|
|
|
$encrypted_password_key, |
1558
|
|
|
(int) $inputData['itemId'], |
1559
|
|
|
$itemFieldsForTasks, |
1560
|
|
|
[] |
1561
|
|
|
); |
1562
|
|
|
} |
1563
|
|
|
|
1564
|
|
|
// If template enable, is there a main one selected? |
1565
|
|
|
if ( |
1566
|
|
|
isset($SETTINGS['item_creation_templates']) === true |
1567
|
|
|
&& (int) $SETTINGS['item_creation_templates'] === 1 |
1568
|
|
|
) { |
1569
|
|
|
DB::queryFirstRow( |
1570
|
|
|
'SELECT * |
1571
|
|
|
FROM ' . prefixTable('templates') . ' |
1572
|
|
|
WHERE item_id = %i', |
1573
|
|
|
$inputData['itemId'] |
1574
|
|
|
); |
1575
|
|
|
if (DB::count() === 0 && empty($post_template_id) === false) { |
1576
|
|
|
// store field text |
1577
|
|
|
DB::insert( |
1578
|
|
|
prefixTable('templates'), |
1579
|
|
|
array( |
1580
|
|
|
'item_id' => $inputData['itemId'], |
1581
|
|
|
'category_id' => $post_template_id, |
1582
|
|
|
) |
1583
|
|
|
); |
1584
|
|
|
} else { |
1585
|
|
|
// Delete if empty |
1586
|
|
|
if (empty($post_template_id) === true) { |
1587
|
|
|
DB::delete( |
1588
|
|
|
prefixTable('templates'), |
1589
|
|
|
'item_id = %i', |
1590
|
|
|
$inputData['itemId'] |
1591
|
|
|
); |
1592
|
|
|
} else { |
1593
|
|
|
// Update value |
1594
|
|
|
DB::update( |
1595
|
|
|
prefixTable('templates'), |
1596
|
|
|
array( |
1597
|
|
|
'category_id' => $post_template_id, |
1598
|
|
|
), |
1599
|
|
|
'item_id = %i', |
1600
|
|
|
$inputData['itemId'] |
1601
|
|
|
); |
1602
|
|
|
} |
1603
|
|
|
} |
1604
|
|
|
} |
1605
|
|
|
|
1606
|
|
|
// Update automatic deletion - Only by the creator of the Item |
1607
|
|
|
if ( |
1608
|
|
|
isset($SETTINGS['enable_delete_after_consultation']) === true |
1609
|
|
|
&& (int) $SETTINGS['enable_delete_after_consultation'] === 1 |
1610
|
|
|
) { |
1611
|
|
|
// check if elem exists in Table. If not add it or update it. |
1612
|
|
|
DB::query( |
1613
|
|
|
'SELECT * |
1614
|
|
|
FROM ' . prefixTable('automatic_del') . ' |
1615
|
|
|
WHERE item_id = %i', |
1616
|
|
|
$inputData['itemId'] |
1617
|
|
|
); |
1618
|
|
|
|
1619
|
|
|
if (DB::count() === 0) { |
1620
|
|
|
// No automatic deletion for this item |
1621
|
|
|
if ( |
1622
|
|
|
empty($post_to_be_deleted_after_date) === false |
1623
|
|
|
|| (int) $post_to_be_deleted_after_x_views > 0 |
1624
|
|
|
) { |
1625
|
|
|
// Automatic deletion to be added |
1626
|
|
|
DB::insert( |
1627
|
|
|
prefixTable('automatic_del'), |
1628
|
|
|
array( |
1629
|
|
|
'item_id' => $inputData['itemId'], |
1630
|
|
|
'del_enabled' => 1, |
1631
|
|
|
'del_type' => empty($post_to_be_deleted_after_x_views) === false ? |
1632
|
|
|
1 : 2, //1 = numeric : 2 = date |
1633
|
|
|
'del_value' => empty($post_to_be_deleted_after_x_views) === false ? |
1634
|
|
|
(int) $post_to_be_deleted_after_x_views : dateToStamp($post_to_be_deleted_after_date, $SETTINGS['date_format']), |
1635
|
|
|
) |
1636
|
|
|
); |
1637
|
|
|
|
1638
|
|
|
// Store updates performed |
1639
|
|
|
array_push( |
1640
|
|
|
$arrayOfChanges, |
1641
|
|
|
$lang->get('automatic_deletion_engaged') . ': ' . $lang->get('enabled') |
1642
|
|
|
); |
1643
|
|
|
|
1644
|
|
|
// update LOG |
1645
|
|
|
logItems( |
1646
|
|
|
$SETTINGS, |
1647
|
|
|
(int) $inputData['itemId'], |
1648
|
|
|
$inputData['label'], |
1649
|
|
|
$session->get('user-id'), |
1650
|
|
|
'at_modification', |
1651
|
|
|
$session->get('user-login'), |
1652
|
|
|
'at_automatic_del : enabled' |
1653
|
|
|
); |
1654
|
|
|
} |
1655
|
|
|
} else { |
1656
|
|
|
// Automatic deletion exists for this item |
1657
|
|
|
if ( |
1658
|
|
|
empty($post_to_be_deleted_after_date) === false |
1659
|
|
|
|| (int) $post_to_be_deleted_after_x_views > 0 |
1660
|
|
|
) { |
1661
|
|
|
// Update automatic deletion |
1662
|
|
|
DB::update( |
1663
|
|
|
prefixTable('automatic_del'), |
1664
|
|
|
array( |
1665
|
|
|
'del_type' => empty($post_to_be_deleted_after_x_views) === false ? |
1666
|
|
|
1 : 2, //1 = numeric : 2 = date |
1667
|
|
|
'del_value' => empty($post_to_be_deleted_after_x_views) === false ? |
1668
|
|
|
$post_to_be_deleted_after_x_views : dateToStamp($post_to_be_deleted_after_date, $SETTINGS['date_format']), |
1669
|
|
|
), |
1670
|
|
|
'item_id = %i', |
1671
|
|
|
$inputData['itemId'] |
1672
|
|
|
); |
1673
|
|
|
} else { |
1674
|
|
|
// delete automatic deleteion for this item |
1675
|
|
|
DB::delete( |
1676
|
|
|
prefixTable('automatic_del'), |
1677
|
|
|
'item_id = %i', |
1678
|
|
|
$inputData['itemId'] |
1679
|
|
|
); |
1680
|
|
|
|
1681
|
|
|
// Store updates performed |
1682
|
|
|
array_push( |
1683
|
|
|
$arrayOfChanges, |
1684
|
|
|
$lang->get('automatic_deletion_engaged') . ': ' . $lang->get('disabled') |
1685
|
|
|
); |
1686
|
|
|
|
1687
|
|
|
// update LOG |
1688
|
|
|
logItems( |
1689
|
|
|
$SETTINGS, |
1690
|
|
|
(int) $inputData['itemId'], |
1691
|
|
|
$inputData['label'], |
1692
|
|
|
$session->get('user-id'), |
1693
|
|
|
'at_modification', |
1694
|
|
|
$session->get('user-login'), |
1695
|
|
|
'at_automatic_del : disabled' |
1696
|
|
|
); |
1697
|
|
|
} |
1698
|
|
|
} |
1699
|
|
|
} |
1700
|
|
|
|
1701
|
|
|
// get readable list of restriction |
1702
|
|
|
if ( |
1703
|
|
|
is_array($post_restricted_to) === true |
1704
|
|
|
&& count($post_restricted_to) > 0 |
1705
|
|
|
&& isset($SETTINGS['restricted_to']) === true |
1706
|
|
|
&& (int) $SETTINGS['restricted_to'] === 1 |
1707
|
|
|
) { |
1708
|
|
|
foreach ($post_restricted_to as $userId) { |
1709
|
|
|
if (empty($userId) === false) { |
1710
|
|
|
$dataTmp = DB::queryFirstRow( |
1711
|
|
|
'SELECT id, name, lastname |
1712
|
|
|
FROM ' . prefixTable('users') . ' |
1713
|
|
|
WHERE id= %i', |
1714
|
|
|
$userId |
1715
|
|
|
); |
1716
|
|
|
|
1717
|
|
|
// Add to array |
1718
|
|
|
array_push( |
1719
|
|
|
$arrayOfUsersRestriction, |
1720
|
|
|
$dataTmp['name'] . ' ' . $dataTmp['lastname'] |
1721
|
|
|
); |
1722
|
|
|
array_push( |
1723
|
|
|
$arrayOfUsersIdRestriction, |
1724
|
|
|
$dataTmp['id'] |
1725
|
|
|
); |
1726
|
|
|
} |
1727
|
|
|
} |
1728
|
|
|
} |
1729
|
|
|
if ((int) $SETTINGS['restricted_to'] === 1) { |
1730
|
|
|
$diffUsersRestiction = array_diff( |
1731
|
|
|
empty($data['restricted_to']) === false ? |
1732
|
|
|
explode(';', $data['restricted_to']) : array(), |
1733
|
|
|
$arrayOfUsersIdRestriction |
1734
|
|
|
); |
1735
|
|
|
} |
1736
|
|
|
|
1737
|
|
|
// Manage retriction_to_roles |
1738
|
|
|
if ( |
1739
|
|
|
is_array($post_restricted_to_roles) === true |
1740
|
|
|
&& count($post_restricted_to_roles) > 0 |
1741
|
|
|
&& isset($SETTINGS['restricted_to_roles']) === true |
1742
|
|
|
&& (int) $SETTINGS['restricted_to_roles'] === 1 |
1743
|
|
|
) { |
1744
|
|
|
// Init |
1745
|
|
|
$arrayOfRestrictionRolesOld = array(); |
1746
|
|
|
$arrayOfRestrictionRoles = array(); |
1747
|
|
|
|
1748
|
|
|
// get values before deleting them |
1749
|
|
|
$rows = DB::query( |
1750
|
|
|
'SELECT t.title, t.id AS id |
1751
|
|
|
FROM ' . prefixTable('roles_title') . ' as t |
1752
|
|
|
INNER JOIN ' . prefixTable('restriction_to_roles') . ' as r ON (t.id=r.role_id) |
1753
|
|
|
WHERE r.item_id = %i |
1754
|
|
|
ORDER BY t.title ASC', |
1755
|
|
|
$inputData['itemId'] |
1756
|
|
|
); |
1757
|
|
|
foreach ($rows as $record) { |
1758
|
|
|
// Add to array |
1759
|
|
|
array_push( |
1760
|
|
|
$arrayOfRestrictionRolesOld, |
1761
|
|
|
$record['title'] |
1762
|
|
|
); |
1763
|
|
|
} |
1764
|
|
|
// delete previous values |
1765
|
|
|
DB::delete( |
1766
|
|
|
prefixTable('restriction_to_roles'), |
1767
|
|
|
'item_id = %i', |
1768
|
|
|
$inputData['itemId'] |
1769
|
|
|
); |
1770
|
|
|
|
1771
|
|
|
// add roles for item |
1772
|
|
|
if ( |
1773
|
|
|
is_array($post_restricted_to_roles) === true |
1774
|
|
|
&& count($post_restricted_to_roles) > 0 |
1775
|
|
|
) { |
1776
|
|
|
foreach ($post_restricted_to_roles as $role) { |
1777
|
|
|
DB::insert( |
1778
|
|
|
prefixTable('restriction_to_roles'), |
1779
|
|
|
array( |
1780
|
|
|
'role_id' => $role, |
1781
|
|
|
'item_id' => $inputData['itemId'], |
1782
|
|
|
) |
1783
|
|
|
); |
1784
|
|
|
$dataTmp = DB::queryFirstRow( |
1785
|
|
|
'SELECT title |
1786
|
|
|
FROM ' . prefixTable('roles_title') . ' |
1787
|
|
|
WHERE id = %i', |
1788
|
|
|
$role |
1789
|
|
|
); |
1790
|
|
|
|
1791
|
|
|
// Add to array |
1792
|
|
|
array_push( |
1793
|
|
|
$arrayOfRestrictionRoles, |
1794
|
|
|
$dataTmp['title'] |
1795
|
|
|
); |
1796
|
|
|
} |
1797
|
|
|
|
1798
|
|
|
if ((int) $SETTINGS['restricted_to'] === 1) { |
1799
|
|
|
$diffRolesRestiction = array_diff( |
1800
|
|
|
$arrayOfRestrictionRoles, |
1801
|
|
|
$arrayOfRestrictionRolesOld |
1802
|
|
|
); |
1803
|
|
|
} |
1804
|
|
|
} |
1805
|
|
|
} |
1806
|
|
|
// Update CACHE table |
1807
|
|
|
updateCacheTable('update_value', (int) $inputData['itemId']); |
1808
|
|
|
|
1809
|
|
|
|
1810
|
|
|
// Manage OTP status |
1811
|
|
|
// Get current status |
1812
|
|
|
$otpStatus = DB::queryFirstRow( |
1813
|
|
|
'SELECT enabled as otp_is_enabled, phone_number, secret |
1814
|
|
|
FROM ' . prefixTable('items_otp') . ' |
1815
|
|
|
WHERE item_id = %i', |
1816
|
|
|
$inputData['itemId'] |
1817
|
|
|
); |
1818
|
|
|
|
1819
|
|
|
// If previous OTP secret is not empty, decrypt it |
1820
|
|
|
if (DB::count() > 0 && $otpStatus['secret'] !== '') { |
1821
|
|
|
// Get current secret |
1822
|
|
|
$currentsecret = cryption( |
1823
|
|
|
$otpStatus['secret'], |
1824
|
|
|
'', |
1825
|
|
|
'decrypt' |
1826
|
|
|
)['string']; |
1827
|
|
|
} else { |
1828
|
|
|
$currentsecret=''; |
1829
|
|
|
} |
1830
|
|
|
|
1831
|
|
|
// If OTP secret provided then encrypt it |
1832
|
|
|
if (empty($post_otp_secret) === false) { |
1833
|
|
|
// Encrypt secret |
1834
|
|
|
$encryptedSecret = cryption( |
1835
|
|
|
$post_otp_secret, |
1836
|
|
|
'', |
1837
|
|
|
'encrypt' |
1838
|
|
|
); |
1839
|
|
|
} |
1840
|
|
|
|
1841
|
|
|
// Check if status or secret or phone number has changed |
1842
|
|
|
if (DB::count() > 0 |
1843
|
|
|
&& ( |
1844
|
|
|
((int) $otpStatus['otp_is_enabled'] !== (int) $post_otp_is_enabled) |
1845
|
|
|
|| ($otpStatus['phone_number'] !== $post_otp_phone_number) |
1846
|
|
|
|| ($currentsecret !== $post_otp_secret) |
1847
|
|
|
) |
1848
|
|
|
&& isset($encryptedSecret['string']) === true |
1849
|
|
|
) { |
1850
|
|
|
// Update status |
1851
|
|
|
DB::update( |
1852
|
|
|
prefixTable('items_otp'), |
1853
|
|
|
array( |
1854
|
|
|
'enabled' => (int) $post_otp_is_enabled, |
1855
|
|
|
'secret' => $encryptedSecret['string'], |
1856
|
|
|
'phone_number' => $post_otp_phone_number, |
1857
|
|
|
'timestamp' => time(), |
1858
|
|
|
), |
1859
|
|
|
'item_id = %i', |
1860
|
|
|
$inputData['itemId'] |
1861
|
|
|
); |
1862
|
|
|
|
1863
|
|
|
// Store updates performed |
1864
|
|
|
array_push( |
1865
|
|
|
$arrayOfChanges, |
1866
|
|
|
$lang->get('otp_status') |
1867
|
|
|
); |
1868
|
|
|
|
1869
|
|
|
// update LOG |
1870
|
|
|
if ((int) $otpStatus['otp_is_enabled'] !== (int) $post_otp_is_enabled) { |
1871
|
|
|
logItems( |
1872
|
|
|
$SETTINGS, |
1873
|
|
|
(int) $inputData['itemId'], |
1874
|
|
|
$inputData['label'], |
1875
|
|
|
$session->get('user-id'), |
1876
|
|
|
'at_modification', |
1877
|
|
|
$session->get('user-login'), |
1878
|
|
|
'at_otp_status:' . ((int) $post_otp_is_enabled === 0 ? 'disabled' : 'enabled') |
1879
|
|
|
); |
1880
|
|
|
} |
1881
|
|
|
if ($otpStatus['phone_number'] !== $post_otp_phone_number) { |
1882
|
|
|
logItems( |
1883
|
|
|
$SETTINGS, |
1884
|
|
|
(int) $inputData['itemId'], |
1885
|
|
|
$inputData['label'], |
1886
|
|
|
$session->get('user-id'), |
1887
|
|
|
'at_modification', |
1888
|
|
|
$session->get('user-login'), |
1889
|
|
|
'at_phone_number:' . $otpStatus['phone_number'] . ' => ' . $post_otp_phone_number |
1890
|
|
|
); |
1891
|
|
|
} |
1892
|
|
|
if ($currentsecret !== $post_otp_secret) { |
1893
|
|
|
logItems( |
1894
|
|
|
$SETTINGS, |
1895
|
|
|
(int) $inputData['itemId'], |
1896
|
|
|
$inputData['label'], |
1897
|
|
|
$session->get('user-id'), |
1898
|
|
|
'at_modification', |
1899
|
|
|
$session->get('user-login'), |
1900
|
|
|
'at_otp_secret:'.$currentsecret |
1901
|
|
|
); |
1902
|
|
|
} |
1903
|
|
|
} elseif (DB::count() === 0 && empty($post_otp_secret) === false) { |
1904
|
|
|
// Create the entry in items_otp table |
1905
|
|
|
// OTP doesn't exist then create it |
1906
|
|
|
|
1907
|
|
|
// insert in table |
1908
|
|
|
DB::insert( |
1909
|
|
|
prefixTable('items_otp'), |
1910
|
|
|
array( |
1911
|
|
|
'item_id' => $inputData['itemId'], |
1912
|
|
|
'secret' => $encryptedSecret['string'], |
1913
|
|
|
'phone_number' => $post_otp_phone_number, |
1914
|
|
|
'timestamp' => time(), |
1915
|
|
|
'enabled' => 1, |
1916
|
|
|
) |
1917
|
|
|
); |
1918
|
|
|
} |
1919
|
|
|
|
1920
|
|
|
//---- Log all modifications done ---- |
1921
|
|
|
|
1922
|
|
|
// RESTRICTIONS |
1923
|
|
|
if (count($diffRolesRestiction) > 0 || count($diffUsersRestiction) > 0) { |
1924
|
|
|
// Store updates performed |
1925
|
|
|
array_push( |
1926
|
|
|
$arrayOfChanges, |
1927
|
|
|
$lang->get('at_restriction') |
1928
|
|
|
); |
1929
|
|
|
|
1930
|
|
|
// Log |
1931
|
|
|
logItems( |
1932
|
|
|
$SETTINGS, |
1933
|
|
|
(int) $inputData['itemId'], |
1934
|
|
|
$inputData['label'], |
1935
|
|
|
$session->get('user-id'), |
1936
|
|
|
'at_modification', |
1937
|
|
|
$session->get('user-login'), |
1938
|
|
|
'at_restriction : ' . (count($diffUsersRestiction) > 0 ? |
1939
|
|
|
implode(', ', $arrayOfUsersRestriction) . (count($diffRolesRestiction) > 0 ? ', ' : '') : '') . (count($diffRolesRestiction) > 0 ? implode(', ', $arrayOfRestrictionRoles) : '') |
1940
|
|
|
); |
1941
|
|
|
} |
1942
|
|
|
|
1943
|
|
|
// LABEL |
1944
|
|
|
if ($data['label'] !== $inputData['label']) { |
1945
|
|
|
// Store updates performed |
1946
|
|
|
array_push( |
1947
|
|
|
$arrayOfChanges, |
1948
|
|
|
$lang->get('at_label') |
1949
|
|
|
); |
1950
|
|
|
|
1951
|
|
|
// Log |
1952
|
|
|
logItems( |
1953
|
|
|
$SETTINGS, |
1954
|
|
|
(int) $inputData['itemId'], |
1955
|
|
|
$inputData['label'], |
1956
|
|
|
$session->get('user-id'), |
1957
|
|
|
'at_modification', |
1958
|
|
|
$session->get('user-login'), |
1959
|
|
|
'at_label : ' . $data['label'] . ' => ' . $inputData['label'] |
1960
|
|
|
); |
1961
|
|
|
} |
1962
|
|
|
// LOGIN |
1963
|
|
|
if ($data['login'] !== $post_login) { |
1964
|
|
|
// Store updates performed |
1965
|
|
|
array_push( |
1966
|
|
|
$arrayOfChanges, |
1967
|
|
|
$lang->get('at_login') |
1968
|
|
|
); |
1969
|
|
|
|
1970
|
|
|
// Log |
1971
|
|
|
logItems( |
1972
|
|
|
$SETTINGS, |
1973
|
|
|
(int) $inputData['itemId'], |
1974
|
|
|
$inputData['label'], |
1975
|
|
|
$session->get('user-id'), |
1976
|
|
|
'at_modification', |
1977
|
|
|
$session->get('user-login'), |
1978
|
|
|
'at_login : ' . $data['login'] . ' => ' . $post_login |
1979
|
|
|
); |
1980
|
|
|
} |
1981
|
|
|
// EMAIL |
1982
|
|
|
if ($post_email !== null && $data['email'] !== null && strcmp($data['email'], $post_email) !== 0) { |
1983
|
|
|
// Store updates performed |
1984
|
|
|
array_push( |
1985
|
|
|
$arrayOfChanges, |
1986
|
|
|
$lang->get('at_email') |
1987
|
|
|
); |
1988
|
|
|
|
1989
|
|
|
// Log |
1990
|
|
|
logItems( |
1991
|
|
|
$SETTINGS, |
1992
|
|
|
(int) $inputData['itemId'], |
1993
|
|
|
$inputData['label'], |
1994
|
|
|
$session->get('user-id'), |
1995
|
|
|
'at_modification', |
1996
|
|
|
$session->get('user-login'), |
1997
|
|
|
'at_email : ' . $data['email'] . ' => ' . $post_email |
1998
|
|
|
); |
1999
|
|
|
} |
2000
|
|
|
// URL |
2001
|
|
|
if ($data['url'] !== $post_url && $post_url !== 'http://') { |
2002
|
|
|
// Store updates performed |
2003
|
|
|
array_push( |
2004
|
|
|
$arrayOfChanges, |
2005
|
|
|
$lang->get('at_url') |
2006
|
|
|
); |
2007
|
|
|
|
2008
|
|
|
// Log |
2009
|
|
|
logItems( |
2010
|
|
|
$SETTINGS, |
2011
|
|
|
(int) $inputData['itemId'], |
2012
|
|
|
$inputData['label'], |
2013
|
|
|
$session->get('user-id'), |
2014
|
|
|
'at_modification', |
2015
|
|
|
$session->get('user-login'), |
2016
|
|
|
'at_url : ' . $data['url'] . ' => ' . $post_url |
2017
|
|
|
); |
2018
|
|
|
} |
2019
|
|
|
// DESCRIPTION |
2020
|
|
|
// deepcode ignore InsecureHash: md5 is used just to perform a string encrypted comparison |
2021
|
|
|
if (strcmp(md5(strip_tags($data['description'])), md5(strip_tags($post_description))) !== 0) { |
2022
|
|
|
// Store updates performed |
2023
|
|
|
array_push( |
2024
|
|
|
$arrayOfChanges, |
2025
|
|
|
$lang->get('at_description') |
2026
|
|
|
); |
2027
|
|
|
|
2028
|
|
|
// Log |
2029
|
|
|
logItems( |
2030
|
|
|
$SETTINGS, |
2031
|
|
|
(int) $inputData['itemId'], |
2032
|
|
|
$inputData['label'], |
2033
|
|
|
$session->get('user-id'), |
2034
|
|
|
'at_modification', |
2035
|
|
|
$session->get('user-login'), |
2036
|
|
|
'at_description' |
2037
|
|
|
); |
2038
|
|
|
} |
2039
|
|
|
// FOLDER |
2040
|
|
|
if ((int) $data['id_tree'] !== (int) $inputData['folderId']) { |
2041
|
|
|
// Get name of folders |
2042
|
|
|
$dataTmp = DB::query('SELECT title FROM ' . prefixTable('nested_tree') . ' WHERE id IN %li', array($data['id_tree'], $inputData['folderId'])); |
2043
|
|
|
|
2044
|
|
|
// Store updates performed |
2045
|
|
|
array_push( |
2046
|
|
|
$arrayOfChanges, |
2047
|
|
|
$lang->get('at_category') |
2048
|
|
|
); |
2049
|
|
|
|
2050
|
|
|
// Log |
2051
|
|
|
logItems( |
2052
|
|
|
$SETTINGS, |
2053
|
|
|
(int) $inputData['itemId'], |
2054
|
|
|
$inputData['label'], |
2055
|
|
|
$session->get('user-id'), |
2056
|
|
|
'at_modification', |
2057
|
|
|
$session->get('user-login'), |
2058
|
|
|
'at_category : ' . $dataTmp[0]['title'] . ' => ' . $dataTmp[1]['title'] |
2059
|
|
|
); |
2060
|
|
|
} |
2061
|
|
|
// ANYONE_CAN_MODIFY |
2062
|
|
|
if ((int) $post_anyone_can_modify !== (int) $data['anyone_can_modify']) { |
2063
|
|
|
// Store updates performed |
2064
|
|
|
array_push( |
2065
|
|
|
$arrayOfChanges, |
2066
|
|
|
$lang->get('at_anyoneconmodify') . ': ' . ((int) $post_anyone_can_modify === 0 ? $lang->get('disabled') : $lang->get('enabled')) |
2067
|
|
|
); |
2068
|
|
|
|
2069
|
|
|
// Log |
2070
|
|
|
logItems( |
2071
|
|
|
$SETTINGS, |
2072
|
|
|
(int) $inputData['itemId'], |
2073
|
|
|
$inputData['label'], |
2074
|
|
|
$session->get('user-id'), |
2075
|
|
|
'at_modification', |
2076
|
|
|
$session->get('user-login'), |
2077
|
|
|
'at_anyoneconmodify : ' . ((int) $post_anyone_can_modify === 0 ? 'disabled' : 'enabled') |
2078
|
|
|
); |
2079
|
|
|
} |
2080
|
|
|
|
2081
|
|
|
// Reload new values |
2082
|
|
|
$dataItem = DB::queryFirstRow( |
2083
|
|
|
'SELECT * |
2084
|
|
|
FROM ' . prefixTable('items') . ' as i |
2085
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
2086
|
|
|
WHERE i.id = %i AND l.action = %s', |
2087
|
|
|
$inputData['itemId'], |
2088
|
|
|
'at_creation' |
2089
|
|
|
); |
2090
|
|
|
// Reload History |
2091
|
|
|
$history = ''; |
2092
|
|
|
$rows = DB::query( |
2093
|
|
|
'SELECT l.date as date, l.action as action, l.raison as raison, u.login as login |
2094
|
|
|
FROM ' . prefixTable('log_items') . ' as l |
2095
|
|
|
LEFT JOIN ' . prefixTable('users') . ' as u ON (l.id_user=u.id) |
2096
|
|
|
WHERE l.action <> %s AND id_item=%s', |
2097
|
|
|
'at_shown', |
2098
|
|
|
$inputData['itemId'] |
2099
|
|
|
); |
2100
|
|
|
foreach ($rows as $record) { |
2101
|
|
|
if ($record['raison'] === NULL) continue; |
2102
|
|
|
$reason = explode(':', $record['raison']); |
2103
|
|
|
if (count($reason) > 0) { |
2104
|
|
|
$sentence = date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date']) . ' - ' |
2105
|
|
|
. $record['login'] . ' - ' . $lang->get($record['action']) . ' - ' |
2106
|
|
|
. (empty($record['raison']) === false ? (count($reason) > 1 ? $lang->get(trim($reason[0])) . ' : ' . $reason[1] |
2107
|
|
|
: $lang->get(trim($reason[0]))) : ''); |
2108
|
|
|
if (empty($history)) { |
2109
|
|
|
$history = $sentence; |
2110
|
|
|
} else { |
2111
|
|
|
$history .= '<br />' . $sentence; |
2112
|
|
|
} |
2113
|
|
|
} |
2114
|
|
|
} |
2115
|
|
|
|
2116
|
|
|
// generate 2d key |
2117
|
|
|
$session->set('user-key_tmp', bin2hex(GenerateCryptKey(16, false, true, true, false, true))); |
2118
|
|
|
|
2119
|
|
|
// Send email |
2120
|
|
|
if (is_array($post_diffusion_list) === true && count($post_diffusion_list) > 0) { |
2121
|
|
|
$cpt = 0; |
2122
|
|
|
foreach ($post_diffusion_list as $emailAddress) { |
2123
|
|
|
if (empty($emailAddress) === false) { |
2124
|
|
|
prepareSendingEmail( |
2125
|
|
|
$lang->get('email_subject_item_updated'), |
2126
|
|
|
str_replace( |
2127
|
|
|
array('#item_label#', '#item_category#', '#item_id#', '#url#', '#name#', '#lastname#', '#folder_name#'), |
2128
|
|
|
array($inputData['label'], (string) $inputData['folderId'], (string) $inputData['itemId'], $SETTINGS['cpassman_url'], $session->get('user-name'), $session->get('user-lastname'), $dataFolderSettings['title']), |
2129
|
|
|
$lang->get('email_body_item_updated') |
2130
|
|
|
), |
2131
|
|
|
$emailAddress, |
2132
|
|
|
$post_diffusion_list_names[$cpt] |
2133
|
|
|
); |
2134
|
|
|
$cpt++; |
2135
|
|
|
} |
2136
|
|
|
} |
2137
|
|
|
} |
2138
|
|
|
|
2139
|
|
|
// Remove the edition lock if no encryption steps are needed |
2140
|
|
|
if ($encryptionTaskIsRequested === false) { |
2141
|
|
|
if (defined('LOG_TO_SERVER') && LOG_TO_SERVER === true) { |
2142
|
|
|
error_log('Remove the edition lock if no encryption steps are needed'); |
2143
|
|
|
} |
2144
|
|
|
DB::delete( |
2145
|
|
|
prefixTable('items_edition'), |
2146
|
|
|
'item_id = %i AND user_id = %i', |
2147
|
|
|
$inputData['itemId'], |
2148
|
|
|
$session->get('user-id') |
2149
|
|
|
); |
2150
|
|
|
} |
2151
|
|
|
|
2152
|
|
|
// Notifiy changes to the users |
2153
|
|
|
notifyChangesToSubscribers($inputData['itemId'], $inputData['label'], $arrayOfChanges, $SETTINGS); |
2154
|
|
|
|
2155
|
|
|
// Prepare some stuff to return |
2156
|
|
|
$arrData = array( |
2157
|
|
|
'error' => false, |
2158
|
|
|
'message' => '', |
2159
|
|
|
); |
2160
|
|
|
} else { |
2161
|
|
|
echo (string) prepareExchangedData( |
2162
|
|
|
array( |
2163
|
|
|
'error' => true, |
2164
|
|
|
'message' => $lang->get('error_not_allowed_to_edit_item'), |
2165
|
|
|
), |
2166
|
|
|
'encode' |
2167
|
|
|
); |
2168
|
|
|
break; |
2169
|
|
|
} |
2170
|
|
|
|
2171
|
|
|
// return data |
2172
|
|
|
echo (string) prepareExchangedData( |
2173
|
|
|
$arrData, |
2174
|
|
|
'encode' |
2175
|
|
|
); |
2176
|
|
|
break; |
2177
|
|
|
|
2178
|
|
|
/* |
2179
|
|
|
* CASE |
2180
|
|
|
* Copy an Item |
2181
|
|
|
*/ |
2182
|
|
|
case 'copy_item': |
2183
|
|
|
// Check KEY and rights |
2184
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
2185
|
|
|
echo (string) prepareExchangedData( |
2186
|
|
|
array( |
2187
|
|
|
'error' => true, |
2188
|
|
|
'message' => $lang->get('key_is_not_correct'), |
2189
|
|
|
), |
2190
|
|
|
'encode' |
2191
|
|
|
); |
2192
|
|
|
break; |
2193
|
|
|
} |
2194
|
|
|
if ($session->get('user-read_only') === 1) { |
2195
|
|
|
echo (string) prepareExchangedData( |
2196
|
|
|
array( |
2197
|
|
|
'error' => true, |
2198
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
2199
|
|
|
), |
2200
|
|
|
'encode' |
2201
|
|
|
); |
2202
|
|
|
break; |
2203
|
|
|
} |
2204
|
|
|
|
2205
|
|
|
// decrypt and retreive data in JSON format |
2206
|
|
|
$dataReceived = prepareExchangedData( |
2207
|
|
|
$inputData['data'], |
2208
|
|
|
'decode' |
2209
|
|
|
); |
2210
|
|
|
|
2211
|
|
|
// Prepare POST variables |
2212
|
|
|
$post_new_label = (string) filter_var($dataReceived['new_label'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
2213
|
|
|
$post_source_id = (int) filter_var($dataReceived['source_id'], FILTER_SANITIZE_NUMBER_INT); |
2214
|
|
|
$post_dest_id = (int) filter_var($dataReceived['dest_id'], FILTER_SANITIZE_NUMBER_INT); |
2215
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
2216
|
|
|
|
2217
|
|
|
// perform a check in case of Read-Only user creating an item in his PF |
2218
|
|
|
if ( |
2219
|
|
|
(int) $session->get('user-read_only') === 1 |
2220
|
|
|
&& (in_array($post_source_id, $session->get('user-personal_folders')) === false |
2221
|
|
|
|| in_array($post_dest_id, $session->get('user-personal_folders')) === false) |
2222
|
|
|
) { |
2223
|
|
|
echo (string) prepareExchangedData( |
2224
|
|
|
array( |
2225
|
|
|
'error' => true, |
2226
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
2227
|
|
|
), |
2228
|
|
|
'encode' |
2229
|
|
|
); |
2230
|
|
|
break; |
2231
|
|
|
} |
2232
|
|
|
|
2233
|
|
|
// Init |
2234
|
|
|
$returnValues = ''; |
2235
|
|
|
$pw = ''; |
2236
|
|
|
$is_perso = 0; |
2237
|
|
|
$itemDataArray = array( |
2238
|
|
|
'pwd' => '', |
2239
|
|
|
'fields' => [], |
2240
|
|
|
'files' => [], |
2241
|
|
|
); |
2242
|
|
|
|
2243
|
|
|
if ( |
2244
|
|
|
empty($inputData['itemId']) === false |
2245
|
|
|
&& empty($post_dest_id) === false |
2246
|
|
|
) { |
2247
|
|
|
// load the original record into an array |
2248
|
|
|
$originalRecord = DB::queryFirstRow( |
2249
|
|
|
'SELECT * FROM ' . prefixTable('items') . ' |
2250
|
|
|
WHERE id = %i', |
2251
|
|
|
$inputData['itemId'] |
2252
|
|
|
); |
2253
|
|
|
|
2254
|
|
|
// Check if the folder where this item is accessible to the user |
2255
|
|
|
if (in_array($originalRecord['id_tree'], $session->get('user-accessible_folders')) === false) { |
2256
|
|
|
echo (string) prepareExchangedData( |
2257
|
|
|
array( |
2258
|
|
|
'error' => true, |
2259
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
2260
|
|
|
), |
2261
|
|
|
'encode' |
2262
|
|
|
); |
2263
|
|
|
break; |
2264
|
|
|
} |
2265
|
|
|
|
2266
|
|
|
// Load the destination folder record into an array |
2267
|
|
|
$dataDestination = DB::queryFirstRow( |
2268
|
|
|
'SELECT personal_folder FROM ' . prefixTable('nested_tree') . ' |
2269
|
|
|
WHERE id = %i', |
2270
|
|
|
$post_dest_id |
2271
|
|
|
); |
2272
|
|
|
|
2273
|
|
|
// Get the ITEM object key for the user |
2274
|
|
|
$userKey = DB::queryFirstRow( |
2275
|
|
|
'SELECT share_key |
2276
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
2277
|
|
|
WHERE user_id = %i AND object_id = %i', |
2278
|
|
|
$session->get('user-id'), |
2279
|
|
|
$inputData['itemId'] |
2280
|
|
|
); |
2281
|
|
|
if (DB::count() === 0) { |
2282
|
|
|
// ERROR - No sharekey found for this item and user |
2283
|
|
|
echo (string) prepareExchangedData( |
2284
|
|
|
array( |
2285
|
|
|
'error' => true, |
2286
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
2287
|
|
|
), |
2288
|
|
|
'encode' |
2289
|
|
|
); |
2290
|
|
|
break; |
2291
|
|
|
} |
2292
|
|
|
|
2293
|
|
|
// Decrypt / Encrypt the password |
2294
|
|
|
$cryptedStuff = doDataEncryption( |
2295
|
|
|
base64_decode( |
2296
|
|
|
doDataDecryption( |
2297
|
|
|
$originalRecord['pw'], |
2298
|
|
|
decryptUserObjectKey( |
2299
|
|
|
$userKey['share_key'], |
2300
|
|
|
$session->get('user-private_key') |
2301
|
|
|
) |
2302
|
|
|
) |
2303
|
|
|
) |
2304
|
|
|
); |
2305
|
|
|
// reaffect pw |
2306
|
|
|
$originalRecord['pw'] = $cryptedStuff['encrypted']; |
2307
|
|
|
|
2308
|
|
|
// store pwd object key |
2309
|
|
|
$itemDataArray['pwd'] = $cryptedStuff['objectKey']; |
2310
|
|
|
|
2311
|
|
|
// generate the query to update the new record with the previous values |
2312
|
|
|
$aSet = array(); |
2313
|
|
|
foreach ($originalRecord as $key => $value) { |
2314
|
|
|
$aSet['item_key'] = uniqidReal(50); |
2315
|
|
|
$aSet['created_at'] = time(); |
2316
|
|
|
if ($key === 'id_tree') { |
2317
|
|
|
$aSet['id_tree'] = $post_dest_id; |
2318
|
|
|
} elseif ($key === 'label') { |
2319
|
|
|
$aSet[$key] = $post_new_label; |
2320
|
|
|
} elseif ($key === 'viewed_no') { |
2321
|
|
|
$aSet['viewed_no'] = '0'; |
2322
|
|
|
} elseif ($key === 'pw') { |
2323
|
|
|
$aSet['pw'] = $originalRecord['pw']; |
2324
|
|
|
$aSet['pw_iv'] = ''; |
2325
|
|
|
} elseif ($key === 'perso') { |
2326
|
|
|
$aSet['perso'] = $is_perso; |
2327
|
|
|
} elseif ($key !== 'id' && $key !== 'key') { |
2328
|
|
|
$aSet[$key] = $value; |
2329
|
|
|
} |
2330
|
|
|
} |
2331
|
|
|
|
2332
|
|
|
// insert the new record and get the new auto_increment id |
2333
|
|
|
DB::insert( |
2334
|
|
|
prefixTable('items'), |
2335
|
|
|
$aSet |
2336
|
|
|
); |
2337
|
|
|
$newItemId = DB::insertId(); |
2338
|
|
|
|
2339
|
|
|
// Create sharekeys for users of this new ITEM |
2340
|
|
|
storeUsersShareKey( |
2341
|
|
|
prefixTable('sharekeys_items'), |
2342
|
|
|
(int) $dataDestination['personal_folder'], |
2343
|
|
|
(int) $newItemId, |
2344
|
|
|
$itemDataArray['pwd'], |
2345
|
|
|
true, |
2346
|
|
|
false, |
2347
|
|
|
); |
2348
|
|
|
|
2349
|
|
|
// -------------------- |
2350
|
|
|
// Manage Custom Fields |
2351
|
|
|
$rows = DB::query( |
2352
|
|
|
'SELECT ci.id AS id, ci.data AS data, ci.field_id AS field_id, c.encrypted_data AS encrypted_data |
2353
|
|
|
FROM ' . prefixTable('categories_items') . ' AS ci |
2354
|
|
|
INNER JOIN ' . prefixTable('categories') . ' AS c ON (c.id = ci.field_id) |
2355
|
|
|
WHERE ci.item_id = %i', |
2356
|
|
|
$inputData['itemId'] |
2357
|
|
|
); |
2358
|
|
|
foreach ($rows as $field) { |
2359
|
|
|
// Create the entry for the new item |
2360
|
|
|
|
2361
|
|
|
// Is the data encrypted |
2362
|
|
|
if ((int) $field['encrypted_data'] === 1) { |
2363
|
|
|
// Get user key |
2364
|
|
|
$userKey = DB::queryFirstRow( |
2365
|
|
|
'SELECT share_key |
2366
|
|
|
FROM ' . prefixTable('sharekeys_fields') . ' |
2367
|
|
|
WHERE user_id = %i AND object_id = %i', |
2368
|
|
|
$session->get('user-id'), |
2369
|
|
|
$field['id'] |
2370
|
|
|
); |
2371
|
|
|
// Then decrypt original field value and encrypt with new key |
2372
|
|
|
$cryptedStuff = doDataEncryption( |
2373
|
|
|
base64_decode( |
2374
|
|
|
doDataDecryption( |
2375
|
|
|
$field['data'], |
2376
|
|
|
decryptUserObjectKey( |
2377
|
|
|
$userKey['share_key'] ?? '', |
2378
|
|
|
$session->get('user-private_key') |
2379
|
|
|
) |
2380
|
|
|
) |
2381
|
|
|
) |
2382
|
|
|
); |
2383
|
|
|
// reaffect pw |
2384
|
|
|
$field['data'] = $cryptedStuff['encrypted']; |
2385
|
|
|
} |
2386
|
|
|
|
2387
|
|
|
// store field text |
2388
|
|
|
DB::insert( |
2389
|
|
|
prefixTable('categories_items'), |
2390
|
|
|
array( |
2391
|
|
|
'item_id' => $newItemId, |
2392
|
|
|
'field_id' => $field['field_id'], |
2393
|
|
|
'data' => (int) $field['encrypted_data'] === 1 ? |
2394
|
|
|
$cryptedStuff['encrypted'] : $field['data'], |
2395
|
|
|
'data_iv' => '', |
2396
|
|
|
'encryption_type' => (int) $field['encrypted_data'] === 1 ? |
2397
|
|
|
TP_ENCRYPTION_NAME : 'not_set', |
2398
|
|
|
) |
2399
|
|
|
); |
2400
|
|
|
$newFieldId = DB::insertId(); |
2401
|
|
|
|
2402
|
|
|
// Create sharekeys for current user |
2403
|
|
|
if ((int) $field['encrypted_data'] === 1) { |
2404
|
|
|
// Create sharekeys for user |
2405
|
|
|
storeUsersShareKey( |
2406
|
|
|
prefixTable('sharekeys_fields'), |
2407
|
|
|
(int) $dataDestination['personal_folder'], |
2408
|
|
|
(int) $newFieldId, |
2409
|
|
|
$cryptedStuff['objectKey'], |
2410
|
|
|
true, |
2411
|
|
|
false, |
2412
|
|
|
); |
2413
|
|
|
|
2414
|
|
|
// Build list of fields |
2415
|
|
|
array_push( |
2416
|
|
|
$itemDataArray['fields'], |
2417
|
|
|
array( |
2418
|
|
|
'object_id' => $newFieldId, |
2419
|
|
|
'object_key' => $cryptedStuff['objectKey'], |
2420
|
|
|
) |
2421
|
|
|
); |
2422
|
|
|
} |
2423
|
|
|
} |
2424
|
|
|
// <--- |
2425
|
|
|
|
2426
|
|
|
// ------------------ |
2427
|
|
|
// Manage attachments |
2428
|
|
|
|
2429
|
|
|
// get file key |
2430
|
|
|
$rows = DB::query( |
2431
|
|
|
'SELECT f.id AS id, f.file AS file, f.name AS name, f.status AS status, f.extension AS extension, |
2432
|
|
|
f.size AS size, f.type AS type, s.share_key AS share_key |
2433
|
|
|
FROM ' . prefixTable('files') . ' AS f |
2434
|
|
|
INNER JOIN ' . prefixTable('sharekeys_files') . ' AS s ON (f.id = s.object_id) |
2435
|
|
|
WHERE s.user_id = %i AND f.id_item = %i', |
2436
|
|
|
$session->get('user-id'), |
2437
|
|
|
$inputData['itemId'] |
2438
|
|
|
); |
2439
|
|
|
foreach ($rows as $record) { |
2440
|
|
|
// Check if file still exists |
2441
|
|
|
if (file_exists($SETTINGS['path_to_upload_folder'] . DIRECTORY_SEPARATOR . TP_FILE_PREFIX . base64_decode($record['file'])) === true) { |
2442
|
|
|
// Step1 - decrypt the file |
2443
|
|
|
// deepcode ignore PT: path is sanitized inside decryptFile() |
2444
|
|
|
$fileContent = decryptFile( |
2445
|
|
|
$record['file'], |
2446
|
|
|
$SETTINGS['path_to_upload_folder'], |
2447
|
|
|
decryptUserObjectKey($record['share_key'] ?? '', $session->get('user-private_key')) |
2448
|
|
|
); |
2449
|
|
|
|
2450
|
|
|
// Step2 - create file |
2451
|
|
|
// deepcode ignore InsecureHash: md5 is used jonly for file name in order to get a hashed value in database |
2452
|
|
|
$newFileName = md5(time() . '_' . $record['id']) . '.' . $record['extension']; |
2453
|
|
|
$outstream = fopen($SETTINGS['path_to_upload_folder'] . DIRECTORY_SEPARATOR . $newFileName, 'ab'); |
2454
|
|
|
if ($outstream === false) { |
2455
|
|
|
echo prepareExchangedData( |
2456
|
|
|
array( |
2457
|
|
|
'error' => true, |
2458
|
|
|
'message' => $lang->get('error_cannot_open_file'), |
2459
|
|
|
), |
2460
|
|
|
'encode' |
2461
|
|
|
); |
2462
|
|
|
break; |
2463
|
|
|
} |
2464
|
|
|
fwrite( |
2465
|
|
|
$outstream, |
2466
|
|
|
base64_decode($fileContent) |
2467
|
|
|
); |
2468
|
|
|
|
2469
|
|
|
// Step3 - encrypt the file |
2470
|
|
|
$newFile = encryptFile($newFileName, $SETTINGS['path_to_upload_folder']); |
2471
|
|
|
|
2472
|
|
|
// Step4 - store in database |
2473
|
|
|
DB::insert( |
2474
|
|
|
prefixTable('files'), |
2475
|
|
|
array( |
2476
|
|
|
'id_item' => $newItemId, |
2477
|
|
|
'name' => $record['name'], |
2478
|
|
|
'size' => $record['size'], |
2479
|
|
|
'extension' => $record['extension'], |
2480
|
|
|
'type' => $record['type'], |
2481
|
|
|
'file' => $newFile['fileHash'], |
2482
|
|
|
'status' => TP_ENCRYPTION_NAME, |
2483
|
|
|
'confirmed' => 1, |
2484
|
|
|
) |
2485
|
|
|
); |
2486
|
|
|
$newFileId = DB::insertId(); |
2487
|
|
|
|
2488
|
|
|
// Step5 - create sharekeys |
2489
|
|
|
// Build list of fields |
2490
|
|
|
array_push( |
2491
|
|
|
$itemDataArray['files'], |
2492
|
|
|
array( |
2493
|
|
|
'object_id' => $newFileId, |
2494
|
|
|
'object_key' => $newFile['objectKey'], |
2495
|
|
|
) |
2496
|
|
|
); |
2497
|
|
|
|
2498
|
|
|
storeUsersShareKey( |
2499
|
|
|
prefixTable('sharekeys_files'), |
2500
|
|
|
(int) $dataDestination['personal_folder'], |
2501
|
|
|
(int) $newFileId, |
2502
|
|
|
$newFile['objectKey'], |
2503
|
|
|
true |
2504
|
|
|
); |
2505
|
|
|
} |
2506
|
|
|
} |
2507
|
|
|
// <--- |
2508
|
|
|
|
2509
|
|
|
// Create new task for the new item |
2510
|
|
|
// If it is not a personnal one |
2511
|
|
|
if ((int) $dataDestination['personal_folder'] !== 1) { |
2512
|
|
|
storeTask( |
2513
|
|
|
'item_copy', |
2514
|
|
|
$session->get('user-id'), |
2515
|
|
|
0, |
2516
|
|
|
(int) $post_dest_id, |
2517
|
|
|
(int) $newItemId, |
2518
|
|
|
$itemDataArray['pwd'], |
2519
|
|
|
$itemDataArray['fields'], |
2520
|
|
|
$itemDataArray['files'], |
2521
|
|
|
); |
2522
|
|
|
} |
2523
|
|
|
|
2524
|
|
|
// ------------------------- |
2525
|
|
|
// Add specific restrictions |
2526
|
|
|
$rows = DB::query('SELECT * FROM ' . prefixTable('restriction_to_roles') . ' WHERE item_id = %i', $inputData['itemId']); |
2527
|
|
|
foreach ($rows as $record) { |
2528
|
|
|
DB::insert( |
2529
|
|
|
prefixTable('restriction_to_roles'), |
2530
|
|
|
array( |
2531
|
|
|
'item_id' => $newItemId, |
2532
|
|
|
'role_id' => $record['role_id'], |
2533
|
|
|
) |
2534
|
|
|
); |
2535
|
|
|
} |
2536
|
|
|
|
2537
|
|
|
// Add Tags |
2538
|
|
|
$rows = DB::query('SELECT * FROM ' . prefixTable('tags') . ' WHERE item_id = %i', $inputData['itemId']); |
2539
|
|
|
foreach ($rows as $record) { |
2540
|
|
|
DB::insert( |
2541
|
|
|
prefixTable('tags'), |
2542
|
|
|
array( |
2543
|
|
|
'item_id' => $newItemId, |
2544
|
|
|
'tag' => $record['tag'], |
2545
|
|
|
) |
2546
|
|
|
); |
2547
|
|
|
} |
2548
|
|
|
|
2549
|
|
|
// Add this duplicate in logs |
2550
|
|
|
logItems( |
2551
|
|
|
$SETTINGS, |
2552
|
|
|
(int) $newItemId, |
2553
|
|
|
$originalRecord['label'], |
2554
|
|
|
$session->get('user-id'), |
2555
|
|
|
'at_creation', |
2556
|
|
|
$session->get('user-login') |
2557
|
|
|
); |
2558
|
|
|
// Add the fact that item has been copied in logs |
2559
|
|
|
logItems( |
2560
|
|
|
$SETTINGS, |
2561
|
|
|
(int) $newItemId, |
2562
|
|
|
$originalRecord['label'], |
2563
|
|
|
$session->get('user-id'), |
2564
|
|
|
'at_copy', |
2565
|
|
|
$session->get('user-login') |
2566
|
|
|
); |
2567
|
|
|
|
2568
|
|
|
echo (string) prepareExchangedData( |
2569
|
|
|
array( |
2570
|
|
|
'error' => false, |
2571
|
|
|
'message' => '', |
2572
|
|
|
'new_id' => $newItemId |
2573
|
|
|
), |
2574
|
|
|
'encode' |
2575
|
|
|
); |
2576
|
|
|
|
2577
|
|
|
// Add new item to cache table. |
2578
|
|
|
updateCacheTable('add_value', (int) $newItemId); |
2579
|
|
|
} else { |
2580
|
|
|
// no item |
2581
|
|
|
echo (string) prepareExchangedData( |
2582
|
|
|
array( |
2583
|
|
|
'error' => true, |
2584
|
|
|
'message' => $lang->get('error_missing_id'), |
2585
|
|
|
), |
2586
|
|
|
'encode' |
2587
|
|
|
); |
2588
|
|
|
} |
2589
|
|
|
break; |
2590
|
|
|
|
2591
|
|
|
/* |
2592
|
|
|
* CASE |
2593
|
|
|
* Display informations of selected item |
2594
|
|
|
*/ |
2595
|
|
|
case 'show_details_item': |
2596
|
|
|
// Check KEY and rights |
2597
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
2598
|
|
|
echo (string) prepareExchangedData( |
2599
|
|
|
array( |
2600
|
|
|
'error' => true, |
2601
|
|
|
'message' => $lang->get('key_is_not_correct'), |
2602
|
|
|
), |
2603
|
|
|
'encode' |
2604
|
|
|
); |
2605
|
|
|
break; |
2606
|
|
|
} |
2607
|
|
|
|
2608
|
|
|
// Step #1 |
2609
|
|
|
$session->set('system-show_step2', false); |
2610
|
|
|
|
2611
|
|
|
// Decrypt and retreive data in JSON format |
2612
|
|
|
$dataReceived = prepareExchangedData( |
2613
|
|
|
$inputData['data'], |
2614
|
|
|
'decode' |
2615
|
|
|
); |
2616
|
|
|
|
2617
|
|
|
// Init post variables |
2618
|
|
|
$inputData['id'] = filter_var(($dataReceived['id']), FILTER_SANITIZE_NUMBER_INT); |
2619
|
|
|
$inputData['folderId'] = filter_var(($dataReceived['folder_id']), FILTER_SANITIZE_NUMBER_INT); |
2620
|
|
|
$post_expired_item = filter_var(($dataReceived['expired_item']), FILTER_SANITIZE_NUMBER_INT); |
2621
|
|
|
$post_restricted = filter_var(($dataReceived['restricted']), FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
2622
|
|
|
$post_folder_access_level = isset($dataReceived['folder_access_level']) === true ? |
2623
|
|
|
filter_var(($dataReceived['folder_access_level']), FILTER_SANITIZE_FULL_SPECIAL_CHARS) |
2624
|
|
|
: ''; |
2625
|
|
|
$post_item_rights = filter_var($dataReceived['rights'], FILTER_SANITIZE_NUMBER_INT); |
2626
|
|
|
|
2627
|
|
|
$pwIsEmptyNormal = false; |
2628
|
|
|
$arrData = array(); |
2629
|
|
|
// return ID |
2630
|
|
|
$arrData['id'] = (int) $inputData['id']; |
2631
|
|
|
$arrData['id_user'] = API_USER_ID; |
2632
|
|
|
$arrData['author'] = 'API'; |
2633
|
|
|
|
2634
|
|
|
// Check if item is deleted |
2635
|
|
|
// taking into account that item can be restored. |
2636
|
|
|
// so if restoration timestamp is higher than the deletion one |
2637
|
|
|
// then we can show it |
2638
|
|
|
$item_deleted = DB::queryFirstRow( |
2639
|
|
|
'SELECT * |
2640
|
|
|
FROM ' . prefixTable('log_items') . ' |
2641
|
|
|
WHERE id_item = %i AND action = %s |
2642
|
|
|
ORDER BY date DESC |
2643
|
|
|
LIMIT 0, 1', |
2644
|
|
|
$inputData['id'], |
2645
|
|
|
'at_delete' |
2646
|
|
|
); |
2647
|
|
|
$dataDeleted = DB::count(); |
2648
|
|
|
|
2649
|
|
|
$item_restored = DB::queryFirstRow( |
2650
|
|
|
'SELECT * |
2651
|
|
|
FROM ' . prefixTable('log_items') . ' |
2652
|
|
|
WHERE id_item = %i AND action = %s |
2653
|
|
|
ORDER BY date DESC |
2654
|
|
|
LIMIT 0, 1', |
2655
|
|
|
$inputData['id'], |
2656
|
|
|
'at_restored' |
2657
|
|
|
); |
2658
|
|
|
|
2659
|
|
|
if ($dataDeleted !== 0 && intval($item_deleted['date']) > intval($item_restored['date'])) { |
2660
|
|
|
// This item is deleted => exit |
2661
|
|
|
echo (string) prepareExchangedData( |
2662
|
|
|
array( |
2663
|
|
|
'error' => true, |
2664
|
|
|
'message' => $lang->get('not_allowed_to_see_pw'), |
2665
|
|
|
'show_detail_option' => 2, |
2666
|
|
|
), |
2667
|
|
|
'encode' |
2668
|
|
|
); |
2669
|
|
|
break; |
2670
|
|
|
} |
2671
|
|
|
|
2672
|
|
|
// Get all informations for this item |
2673
|
|
|
$dataItem = DB::queryFirstRow( |
2674
|
|
|
'SELECT * |
2675
|
|
|
FROM ' . prefixTable('items') . ' as i |
2676
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
2677
|
|
|
WHERE i.id = %i AND l.action = %s', |
2678
|
|
|
$inputData['id'], |
2679
|
|
|
'at_creation' |
2680
|
|
|
); |
2681
|
|
|
|
2682
|
|
|
// Notification |
2683
|
|
|
DB::queryFirstRow( |
2684
|
|
|
'SELECT * |
2685
|
|
|
FROM ' . prefixTable('notification') . ' |
2686
|
|
|
WHERE item_id = %i AND user_id = %i', |
2687
|
|
|
$inputData['id'], |
2688
|
|
|
$session->get('user-id') |
2689
|
|
|
); |
2690
|
|
|
if (DB::count() > 0) { |
2691
|
|
|
$arrData['notification_status'] = true; |
2692
|
|
|
} else { |
2693
|
|
|
$arrData['notification_status'] = false; |
2694
|
|
|
} |
2695
|
|
|
|
2696
|
|
|
// Get all USERS infos |
2697
|
|
|
$listeRestriction = is_null($dataItem['restricted_to']) === false ? array_filter(explode(';', $dataItem['restricted_to'])) : []; |
2698
|
|
|
$session->set('system-emails_list_for_notif', ''); |
2699
|
|
|
|
2700
|
|
|
$user_in_restricted_list_of_item = in_array($session->get('user-id'), $listeRestriction) === true ? true : false; |
2701
|
|
|
|
2702
|
|
|
// manage case of API user |
2703
|
|
|
if ($dataItem['id_user'] === API_USER_ID) { |
2704
|
|
|
$arrData['author'] = 'API [' . $dataItem['description'] . ']'; |
2705
|
|
|
$arrData['id_user'] = API_USER_ID; |
2706
|
|
|
$arrData['author_email'] = ''; |
2707
|
|
|
$arrData['notification_status'] = false; |
2708
|
|
|
} |
2709
|
|
|
|
2710
|
|
|
// Get all tags for this item |
2711
|
|
|
$tags = array(); |
2712
|
|
|
$rows = DB::query( |
2713
|
|
|
'SELECT tag |
2714
|
|
|
FROM ' . prefixTable('tags') . ' |
2715
|
|
|
WHERE item_id = %i', |
2716
|
|
|
$inputData['id'] |
2717
|
|
|
); |
2718
|
|
|
foreach ($rows as $record) { |
2719
|
|
|
array_push($tags, $record['tag']); |
2720
|
|
|
} |
2721
|
|
|
|
2722
|
|
|
// TODO -> improve this check |
2723
|
|
|
// check that actual user can access this item |
2724
|
|
|
$restrictionActive = true; |
2725
|
|
|
$restrictedTo = is_null($dataItem['restricted_to']) === false ? array_filter(explode(';', $dataItem['restricted_to'])) : []; |
2726
|
|
|
if ( |
2727
|
|
|
in_array($session->get('user-id'), $restrictedTo) === true |
2728
|
|
|
|| ((int) $session->get('user-manager') === 1 && (int) $SETTINGS['manager_edit'] === 1) |
2729
|
|
|
) { |
2730
|
|
|
$restrictionActive = false; |
2731
|
|
|
} |
2732
|
|
|
if (empty($dataItem['restricted_to']) === true) { |
2733
|
|
|
$restrictionActive = false; |
2734
|
|
|
} |
2735
|
|
|
|
2736
|
|
|
// Check if user has a role that is accepted |
2737
|
|
|
$rows_tmp = DB::query( |
2738
|
|
|
'SELECT role_id |
2739
|
|
|
FROM ' . prefixTable('restriction_to_roles') . ' |
2740
|
|
|
WHERE item_id=%i', |
2741
|
|
|
$inputData['id'] |
2742
|
|
|
); |
2743
|
|
|
foreach ($rows_tmp as $rec_tmp) { |
2744
|
|
|
if (in_array($rec_tmp['role_id'], explode(';', $session->get('user-roles')))) { |
2745
|
|
|
$restrictionActive = false; |
2746
|
|
|
} |
2747
|
|
|
} |
2748
|
|
|
|
2749
|
|
|
// Uncrypt PW |
2750
|
|
|
// Get the object key for the user |
2751
|
|
|
$userKey = DB::queryFirstRow( |
2752
|
|
|
'SELECT share_key |
2753
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
2754
|
|
|
WHERE user_id = %i AND object_id = %i', |
2755
|
|
|
$session->get('user-id'), |
2756
|
|
|
$inputData['id'] |
2757
|
|
|
); |
2758
|
|
|
if (DB::count() === 0 || empty($dataItem['pw']) === true) { |
2759
|
|
|
// No share key found |
2760
|
|
|
$pwIsEmptyNormally = false; |
2761
|
|
|
// Is this a personal and defuse password? |
2762
|
|
|
if ((int) $dataItem['perso'] === 1 && substr($dataItem['pw'], 0, 3) === 'def') { |
2763
|
|
|
// Yes, then ask for decryption with old personal salt key |
2764
|
|
|
echo (string) prepareExchangedData( |
2765
|
|
|
array( |
2766
|
|
|
'error' => true, |
2767
|
|
|
'message' => $lang->get('error'), |
2768
|
|
|
'show_detail_option' => 2, |
2769
|
|
|
'error_type' => 'private_items_to_encrypt', |
2770
|
|
|
), |
2771
|
|
|
'encode' |
2772
|
|
|
); |
2773
|
|
|
break; |
2774
|
|
|
} else { |
2775
|
|
|
$pw = ''; |
2776
|
|
|
} |
2777
|
|
|
} else { |
2778
|
|
|
$pwIsEmptyNormal = true; |
2779
|
|
|
$decryptedObject = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
2780
|
|
|
// if null then we have an error. |
2781
|
|
|
// suspecting bad password |
2782
|
|
|
if (empty($decryptedObject) === false) { |
2783
|
|
|
$pw = doDataDecryption( |
2784
|
|
|
$dataItem['pw'], |
2785
|
|
|
$decryptedObject |
2786
|
|
|
); |
2787
|
|
|
$arrData['pwd_encryption_error'] = false; |
2788
|
|
|
$arrData['pwd_encryption_error_message'] = ''; |
2789
|
|
|
} else { |
2790
|
|
|
$pw = ''; |
2791
|
|
|
$arrData['pwd_encryption_error'] = 'inconsistent_password'; |
2792
|
|
|
$arrData['pwd_encryption_error_message'] = $lang->get('error_new_ldap_password_detected'); |
2793
|
|
|
} |
2794
|
|
|
} |
2795
|
|
|
|
2796
|
|
|
// check user is admin |
2797
|
|
|
$session__list_restricted_folders_for_items = $session->get('system-list_restricted_folders_for_items') ?? []; |
2798
|
|
|
if ( |
2799
|
|
|
(int) $session->get('user-admin') === 1 |
2800
|
|
|
&& (int) $dataItem['perso'] !== 1 |
2801
|
|
|
) { |
2802
|
|
|
$arrData['show_details'] = 0; |
2803
|
|
|
// --- |
2804
|
|
|
// --- |
2805
|
|
|
} elseif (( |
2806
|
|
|
(in_array($dataItem['id_tree'], $session->get('user-accessible_folders')) === true || (int) $session->get('user-admin') === 1) |
2807
|
|
|
&& ((int) $dataItem['perso'] === 0 || ((int) $dataItem['perso'] === 1 && in_array($dataItem['id_tree'], $session->get('user-personal_folders')) === true)) |
2808
|
|
|
&& $restrictionActive === false) |
2809
|
|
|
|| (isset($SETTINGS['anyone_can_modify']) && (int) $SETTINGS['anyone_can_modify'] === 1 |
2810
|
|
|
&& (int) $dataItem['anyone_can_modify'] === 1 |
2811
|
|
|
&& (in_array($dataItem['id_tree'], $session->get('user-accessible_folders')) || (int) $session->get('user-admin') === 1) |
2812
|
|
|
&& $restrictionActive === false) |
2813
|
|
|
|| (null !== $inputData['folderId'] |
2814
|
|
|
&& isset($session__list_restricted_folders_for_items[$inputData['folderId']]) |
2815
|
|
|
&& in_array($inputData['id'], $session__list_restricted_folders_for_items[$inputData['folderId']]) |
2816
|
|
|
&& (int) $post_restricted === 1 |
2817
|
|
|
&& $user_in_restricted_list_of_item === true) |
2818
|
|
|
|| (isset($SETTINGS['restricted_to_roles']) && (int) $SETTINGS['restricted_to_roles'] === 1 |
2819
|
|
|
&& $restrictionActive === false) |
2820
|
|
|
) { |
2821
|
|
|
// Check if actual USER can see this ITEM |
2822
|
|
|
// Allow show details |
2823
|
|
|
$arrData['show_details'] = 1; |
2824
|
|
|
|
2825
|
|
|
// Display menu icon for deleting if user is allowed |
2826
|
|
|
if ( |
2827
|
|
|
(int) $dataItem['id_user'] === (int) $session->get('user-id') |
2828
|
|
|
|| (int) $session->get('user-admin') === 1 |
2829
|
|
|
|| ((int) $session->get('user-manager') === 1 && (int) $SETTINGS['manager_edit'] === 1) |
2830
|
|
|
|| (int) $dataItem['anyone_can_modify'] === 1 |
2831
|
|
|
|| in_array($dataItem['id_tree'], $session->get('system-list_folders_editable_by_role')) === true |
2832
|
|
|
|| in_array($session->get('user-id'), $restrictedTo) === true |
2833
|
|
|
//|| count($restrictedTo) === 0 |
2834
|
|
|
|| (int) $post_folder_access_level === 30 |
2835
|
|
|
|| (int) $post_item_rights >= 40 |
2836
|
|
|
) { |
2837
|
|
|
$arrData['user_can_modify'] = 1; |
2838
|
|
|
$user_is_allowed_to_modify = true; |
2839
|
|
|
} else { |
2840
|
|
|
$arrData['user_can_modify'] = 0; |
2841
|
|
|
$user_is_allowed_to_modify = false; |
2842
|
|
|
} |
2843
|
|
|
|
2844
|
|
|
// Get restriction list for roles |
2845
|
|
|
$listRestrictionRoles = array(); |
2846
|
|
|
if (isset($SETTINGS['restricted_to_roles']) && (int) $SETTINGS['restricted_to_roles'] === 1) { |
2847
|
|
|
// Add restriction if item is restricted to roles |
2848
|
|
|
$rows = DB::query( |
2849
|
|
|
'SELECT t.title, t.id |
2850
|
|
|
FROM ' . prefixTable('roles_title') . ' AS t |
2851
|
|
|
INNER JOIN ' . prefixTable('restriction_to_roles') . ' AS r ON (t.id=r.role_id) |
2852
|
|
|
WHERE r.item_id = %i |
2853
|
|
|
ORDER BY t.title ASC', |
2854
|
|
|
$inputData['id'] |
2855
|
|
|
); |
2856
|
|
|
foreach ($rows as $record) { |
2857
|
|
|
if (!in_array($record['title'], $listRestrictionRoles)) { |
2858
|
|
|
array_push($listRestrictionRoles, $record['id']); |
2859
|
|
|
} |
2860
|
|
|
} |
2861
|
|
|
} |
2862
|
|
|
// Check if any KB is linked to this item |
2863
|
|
|
if (isset($SETTINGS['enable_kb']) && (int) $SETTINGS['enable_kb'] === 1) { |
2864
|
|
|
$tmp = array(); |
2865
|
|
|
$rows = DB::query( |
2866
|
|
|
'SELECT k.label, k.id |
2867
|
|
|
FROM ' . prefixTable('kb_items') . ' as i |
2868
|
|
|
INNER JOIN ' . prefixTable('kb') . ' as k ON (i.kb_id=k.id) |
2869
|
|
|
WHERE i.item_id = %i |
2870
|
|
|
ORDER BY k.label ASC', |
2871
|
|
|
$inputData['id'] |
2872
|
|
|
); |
2873
|
|
|
foreach ($rows as $record) { |
2874
|
|
|
array_push( |
2875
|
|
|
$tmp, |
2876
|
|
|
array( |
2877
|
|
|
'id' => $record['id'], |
2878
|
|
|
'label' => $record['label'], |
2879
|
|
|
) |
2880
|
|
|
); |
2881
|
|
|
} |
2882
|
|
|
$arrData['links_to_kbs'] = $tmp; |
2883
|
|
|
} |
2884
|
|
|
// Prepare DIalogBox data |
2885
|
|
|
if ((int) $post_expired_item === 0) { |
2886
|
|
|
$arrData['show_detail_option'] = 0; |
2887
|
|
|
} elseif ($user_is_allowed_to_modify === true && (int) $post_expired_item === 1) { |
2888
|
|
|
$arrData['show_detail_option'] = 1; |
2889
|
|
|
} else { |
2890
|
|
|
$arrData['show_detail_option'] = 2; |
2891
|
|
|
} |
2892
|
|
|
|
2893
|
|
|
$arrData['label'] = $dataItem['label'] === '' ? '' : $dataItem['label']; |
2894
|
|
|
$arrData['pw_length'] = strlen($pw); |
2895
|
|
|
$arrData['pw_decrypt_info'] = empty($pw) === true && $pwIsEmptyNormal === false ? 'error_no_sharekey_yet' : ''; |
2896
|
|
|
$arrData['email'] = empty($dataItem['email']) === true || $dataItem['email'] === null ? '' : $dataItem['email']; |
2897
|
|
|
$arrData['url'] = empty($dataItem['url']) === true ? '' : $dataItem['url']; |
2898
|
|
|
$arrData['folder'] = $dataItem['id_tree']; |
2899
|
|
|
$arrData['description'] = $dataItem['description']; |
2900
|
|
|
$arrData['login'] = $dataItem['login']; |
2901
|
|
|
$arrData['id_restricted_to'] = $listeRestriction; |
2902
|
|
|
$arrData['id_restricted_to_roles'] = $listRestrictionRoles; |
2903
|
|
|
$arrData['tags'] = $tags; |
2904
|
|
|
$arrData['folder'] = (int) $dataItem['id_tree']; |
2905
|
|
|
$arrData['fa_icon'] = $dataItem['fa_icon']; |
2906
|
|
|
$arrData['item_key'] = $dataItem['item_key']; |
2907
|
|
|
|
2908
|
|
|
if ( |
2909
|
|
|
isset($SETTINGS['enable_server_password_change']) |
2910
|
|
|
&& (int) $SETTINGS['enable_server_password_change'] === 1 |
2911
|
|
|
) { |
2912
|
|
|
$arrData['auto_update_pwd_frequency'] = $dataItem['auto_update_pwd_frequency']; |
2913
|
|
|
} else { |
2914
|
|
|
$arrData['auto_update_pwd_frequency'] = '0'; |
2915
|
|
|
} |
2916
|
|
|
|
2917
|
|
|
$arrData['anyone_can_modify'] = (int) $dataItem['anyone_can_modify']; |
2918
|
|
|
|
2919
|
|
|
// Add the fact that item has been viewed in logs |
2920
|
|
|
if (isset($SETTINGS['log_accessed']) && (int) $SETTINGS['log_accessed'] === 1) { |
2921
|
|
|
logItems( |
2922
|
|
|
$SETTINGS, |
2923
|
|
|
(int) $inputData['id'], |
2924
|
|
|
$dataItem['label'], |
2925
|
|
|
(int) $session->get('user-id'), |
2926
|
|
|
'at_shown', |
2927
|
|
|
$session->get('user-login') |
2928
|
|
|
); |
2929
|
|
|
} |
2930
|
|
|
|
2931
|
|
|
// statistics |
2932
|
|
|
DB::update( |
2933
|
|
|
prefixTable('items'), |
2934
|
|
|
array( |
2935
|
|
|
'viewed_no' => $dataItem['viewed_no'] + 1, |
2936
|
|
|
'updated_at' => time(), |
2937
|
|
|
), |
2938
|
|
|
'id = %i', |
2939
|
|
|
$inputData['id'] |
2940
|
|
|
); |
2941
|
|
|
$arrData['viewed_no'] = $dataItem['viewed_no'] + 1; |
2942
|
|
|
|
2943
|
|
|
// get fields |
2944
|
|
|
$fieldsTmp = array(); |
2945
|
|
|
$arrCatList = $template_id = ''; |
2946
|
|
|
if (isset($SETTINGS['item_extra_fields']) && (int) $SETTINGS['item_extra_fields'] === 1) { |
2947
|
|
|
// get list of associated Categories |
2948
|
|
|
$arrCatList = array(); |
2949
|
|
|
$rows_tmp = DB::query( |
2950
|
|
|
'SELECT id_category |
2951
|
|
|
FROM ' . prefixTable('categories_folders') . ' |
2952
|
|
|
WHERE id_folder=%i', |
2953
|
|
|
$inputData['folderId'] |
2954
|
|
|
); |
2955
|
|
|
|
2956
|
|
|
if (DB::count() > 0) { |
2957
|
|
|
foreach ($rows_tmp as $row) { |
2958
|
|
|
array_push($arrCatList, (int) $row['id_category']); |
2959
|
|
|
} |
2960
|
|
|
|
2961
|
|
|
// get fields for this Item |
2962
|
|
|
$rows_tmp = DB::query( |
2963
|
|
|
'SELECT i.id AS id, i.field_id AS field_id, i.data AS data, i.item_id AS item_id, |
2964
|
|
|
i.encryption_type AS encryption_type, c.encrypted_data AS encrypted_data, c.parent_id AS parent_id, |
2965
|
|
|
c.type as field_type, c.masked AS field_masked, c.role_visibility AS role_visibility |
2966
|
|
|
FROM ' . prefixTable('categories_items') . ' AS i |
2967
|
|
|
INNER JOIN ' . prefixTable('categories') . ' AS c ON (i.field_id=c.id) |
2968
|
|
|
WHERE i.item_id=%i AND c.parent_id IN %ls', |
2969
|
|
|
$inputData['id'], |
2970
|
|
|
$arrCatList |
2971
|
|
|
); |
2972
|
|
|
foreach ($rows_tmp as $row) { |
2973
|
|
|
// Uncrypt data |
2974
|
|
|
// Get the object key for the user |
2975
|
|
|
//db::debugmode(true); |
2976
|
|
|
$userKey = DB::queryFirstRow( |
2977
|
|
|
'SELECT share_key |
2978
|
|
|
FROM ' . prefixTable('sharekeys_fields') . ' |
2979
|
|
|
WHERE user_id = %i AND object_id = %i', |
2980
|
|
|
$session->get('user-id'), |
2981
|
|
|
$row['id'] |
2982
|
|
|
); |
2983
|
|
|
//db::debugmode(false); |
2984
|
|
|
$fieldText = []; |
2985
|
|
|
if (DB::count() === 0 && (int) $row['encrypted_data'] === 1) { |
2986
|
|
|
// Data should be encrypted but no key yet |
2987
|
|
|
// System is currently creating the keys |
2988
|
|
|
$fieldText = [ |
2989
|
|
|
'string' => '', |
2990
|
|
|
'encrypted' => false, |
2991
|
|
|
'error' => 'error_no_sharekey_yet', |
2992
|
|
|
]; |
2993
|
|
|
} else if (DB::count() === 0 && (int) $row['encrypted_data'] === 0) { |
2994
|
|
|
// Data is not encrypted in DB |
2995
|
|
|
$fieldText = [ |
2996
|
|
|
'string' => $row['data'],//#3945 - isBase64($row['data']) === true ? base64_decode($row['data']) : |
2997
|
|
|
'encrypted' => false, |
2998
|
|
|
'error' => false, |
2999
|
|
|
]; |
3000
|
|
|
} else { |
3001
|
|
|
// Data is encrypted in DB and we have a key |
3002
|
|
|
$fieldText = [ |
3003
|
|
|
'string' => doDataDecryption( |
3004
|
|
|
$row['data'], |
3005
|
|
|
decryptUserObjectKey( |
3006
|
|
|
$userKey['share_key'], |
3007
|
|
|
$session->get('user-private_key') |
3008
|
|
|
) |
3009
|
|
|
), |
3010
|
|
|
'encrypted' => true, |
3011
|
|
|
'error' => '', |
3012
|
|
|
]; |
3013
|
|
|
} |
3014
|
|
|
|
3015
|
|
|
// Manage textarea string |
3016
|
|
|
/*if ($row['field_type'] === 'textarea') { |
3017
|
|
|
$fieldText = $fieldText; |
3018
|
|
|
}*/ |
3019
|
|
|
|
3020
|
|
|
// build returned list of Fields text |
3021
|
|
|
array_push( |
3022
|
|
|
$fieldsTmp, |
3023
|
|
|
array( |
3024
|
|
|
'id' => (int) $row['field_id'], |
3025
|
|
|
'value' => $fieldText['string'], |
3026
|
|
|
'encrypted' => (int) $fieldText['encrypted'], |
3027
|
|
|
'parent_id' => (int) $row['parent_id'], |
3028
|
|
|
'type' => $row['field_type'], |
3029
|
|
|
'masked' => (int) $row['field_masked'], |
3030
|
|
|
'error' => (string) $fieldText['error'], |
3031
|
|
|
) |
3032
|
|
|
); |
3033
|
|
|
} |
3034
|
|
|
} |
3035
|
|
|
} |
3036
|
|
|
|
3037
|
|
|
// Now get the selected template (if exists) |
3038
|
|
|
if (isset($SETTINGS['item_creation_templates']) && (int) $SETTINGS['item_creation_templates'] === 1) { |
3039
|
|
|
$rows_tmp = DB::queryFirstRow( |
3040
|
|
|
'SELECT category_id |
3041
|
|
|
FROM ' . prefixTable('templates') . ' |
3042
|
|
|
WHERE item_id = %i', |
3043
|
|
|
$inputData['id'] |
3044
|
|
|
); |
3045
|
|
|
if (DB::count() > 0) { |
3046
|
|
|
$template_id = $rows_tmp['category_id']; |
3047
|
|
|
} |
3048
|
|
|
} |
3049
|
|
|
//} |
3050
|
|
|
$arrData['fields'] = $fieldsTmp; |
3051
|
|
|
$arrData['categories'] = $arrCatList; |
3052
|
|
|
$arrData['template_id'] = (int) $template_id; |
3053
|
|
|
$arrData['to_be_deleted'] = ''; |
3054
|
|
|
|
3055
|
|
|
// Evaluate if item is ready for all users |
3056
|
|
|
$rows_tmp = DB::queryFirstRow( |
3057
|
|
|
'SELECT finished_at |
3058
|
|
|
FROM ' . prefixTable('background_tasks') . ' |
3059
|
|
|
WHERE item_id = %i', |
3060
|
|
|
$inputData['id'] |
3061
|
|
|
); |
3062
|
|
|
$arrData['item_ready'] = DB::count() === 0 ? true : (DB::count() > 0 && empty($rows_tmp['finished_at']) === true ? false : true); |
3063
|
|
|
|
3064
|
|
|
// Manage user restriction |
3065
|
|
|
if (null !== $post_restricted) { |
3066
|
|
|
$arrData['restricted'] = $post_restricted; |
3067
|
|
|
} else { |
3068
|
|
|
$arrData['restricted'] = ''; |
3069
|
|
|
} |
3070
|
|
|
// Decrement the number before being deleted |
3071
|
|
|
if (isset($SETTINGS['enable_delete_after_consultation']) && (int) $SETTINGS['enable_delete_after_consultation'] === 1) { |
3072
|
|
|
// Is the Item to be deleted? |
3073
|
|
|
$dataDelete = DB::queryFirstRow( |
3074
|
|
|
'SELECT * |
3075
|
|
|
FROM ' . prefixTable('automatic_del') . ' |
3076
|
|
|
WHERE item_id = %i', |
3077
|
|
|
$inputData['id'] |
3078
|
|
|
); |
3079
|
|
|
if (DB::count() > 0) { |
3080
|
|
|
$arrData['to_be_deleted'] = $dataDelete['del_value']; |
3081
|
|
|
$arrData['to_be_deleted_type'] = (int) $dataDelete['del_type']; |
3082
|
|
|
} |
3083
|
|
|
|
3084
|
|
|
// Now delete if required |
3085
|
|
|
if ($dataDelete !== null && ((int) $dataDelete['del_enabled'] === 1 |
3086
|
|
|
|| intval($arrData['id_user']) !== intval($session->get('user-id')))) |
3087
|
|
|
{ |
3088
|
|
|
if ((int) $dataDelete['del_type'] === 1 && $dataDelete['del_value'] >= 1) { |
3089
|
|
|
// decrease counter |
3090
|
|
|
DB::update( |
3091
|
|
|
prefixTable('automatic_del'), |
3092
|
|
|
array( |
3093
|
|
|
'del_value' => $dataDelete['del_value'] - 1, |
3094
|
|
|
), |
3095
|
|
|
'item_id = %i', |
3096
|
|
|
$inputData['id'] |
3097
|
|
|
); |
3098
|
|
|
// store value |
3099
|
|
|
$arrData['to_be_deleted'] = $dataDelete['del_value'] - 1; |
3100
|
|
|
} elseif ( |
3101
|
|
|
(int) $dataDelete['del_type'] === 1 |
3102
|
|
|
&& $dataDelete['del_value'] <= 1 |
3103
|
|
|
|| (int) $dataDelete['del_type'] === 2 |
3104
|
|
|
&& $dataDelete['del_value'] < time() |
3105
|
|
|
) { |
3106
|
|
|
$arrData['show_details'] = 0; |
3107
|
|
|
// delete item |
3108
|
|
|
DB::delete(prefixTable('automatic_del'), 'item_id = %i', $inputData['id']); |
3109
|
|
|
// make inactive object |
3110
|
|
|
DB::update( |
3111
|
|
|
prefixTable('items'), |
3112
|
|
|
array( |
3113
|
|
|
'inactif' => 1, |
3114
|
|
|
'deleted_at' => time(), |
3115
|
|
|
), |
3116
|
|
|
'id = %i', |
3117
|
|
|
$inputData['id'] |
3118
|
|
|
); |
3119
|
|
|
|
3120
|
|
|
// log |
3121
|
|
|
logItems( |
3122
|
|
|
$SETTINGS, |
3123
|
|
|
(int) $inputData['id'], |
3124
|
|
|
$dataItem['label'], |
3125
|
|
|
(int) $session->get('user-id'), |
3126
|
|
|
'at_delete', |
3127
|
|
|
$session->get('user-login'), |
3128
|
|
|
'at_automatically_deleted' |
3129
|
|
|
); |
3130
|
|
|
|
3131
|
|
|
// Update cache table |
3132
|
|
|
updateCacheTable('delete_value', (int) $inputData['id']); |
3133
|
|
|
|
3134
|
|
|
$arrData['show_detail_option'] = 1; |
3135
|
|
|
$arrData['to_be_deleted'] = 0; |
3136
|
|
|
} elseif ($dataDelete['del_type'] === '2') { |
3137
|
|
|
$arrData['to_be_deleted'] = date($SETTINGS['date_format'], (int) $dataDelete['del_value']); |
3138
|
|
|
} |
3139
|
|
|
} else { |
3140
|
|
|
$arrData['to_be_deleted'] = ''; |
3141
|
|
|
} |
3142
|
|
|
} else { |
3143
|
|
|
$arrData['to_be_deleted'] = $lang->get('no'); |
3144
|
|
|
} |
3145
|
|
|
// --- |
3146
|
|
|
// --- |
3147
|
|
|
} else { |
3148
|
|
|
$arrData['show_details'] = 0; |
3149
|
|
|
// get readable list of restriction |
3150
|
|
|
$listOfRestricted = ''; |
3151
|
|
|
if (empty($dataItem['restricted_to']) === false) { |
3152
|
|
|
foreach (explode(';', $dataItem['restricted_to']) as $userRest) { |
3153
|
|
|
if (empty($userRest) === false) { |
3154
|
|
|
$dataTmp = DB::queryFirstRow( |
3155
|
|
|
'SELECT login |
3156
|
|
|
FROM ' . prefixTable('users') . ' |
3157
|
|
|
WHERE id= %i', |
3158
|
|
|
$userRest |
3159
|
|
|
); |
3160
|
|
|
if (empty($listOfRestricted)) { |
3161
|
|
|
$listOfRestricted = $dataTmp['login']; |
3162
|
|
|
} else { |
3163
|
|
|
$listOfRestricted .= ';' . $dataTmp['login']; |
3164
|
|
|
} |
3165
|
|
|
} |
3166
|
|
|
} |
3167
|
|
|
} |
3168
|
|
|
$arrData['restricted_to'] = $listOfRestricted; |
3169
|
|
|
$arrData['notification_list'] = ''; |
3170
|
|
|
$arrData['notification_status'] = ''; |
3171
|
|
|
} |
3172
|
|
|
|
3173
|
|
|
// Set a timestamp |
3174
|
|
|
$arrData['timestamp'] = time(); |
3175
|
|
|
|
3176
|
|
|
// Set temporary session variable to allow step2 |
3177
|
|
|
$session->set('system-show_step2', true); |
3178
|
|
|
|
3179
|
|
|
// Error |
3180
|
|
|
$arrData['error'] = ''; |
3181
|
|
|
|
3182
|
|
|
// Encrypt data to return |
3183
|
|
|
echo (string) prepareExchangedData( |
3184
|
|
|
$arrData, |
3185
|
|
|
'encode' |
3186
|
|
|
); |
3187
|
|
|
break; |
3188
|
|
|
|
3189
|
|
|
/* |
3190
|
|
|
* CASE |
3191
|
|
|
* Display History of the selected Item |
3192
|
|
|
*/ |
3193
|
|
|
case 'showDetailsStep2': |
3194
|
|
|
// Is this query expected (must be run after a step1 and not standalone) |
3195
|
|
|
if ($session->get('system-show_step2') !== true) { |
3196
|
|
|
// Check KEY and rights |
3197
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
3198
|
|
|
echo (string) prepareExchangedData( |
3199
|
|
|
array( |
3200
|
|
|
'error' => true, |
3201
|
|
|
'message' => $lang->get('key_is_not_correct'), |
3202
|
|
|
), |
3203
|
|
|
'encode' |
3204
|
|
|
); |
3205
|
|
|
break; |
3206
|
|
|
} |
3207
|
|
|
if ($session->get('user-read_only') === 1) { |
3208
|
|
|
echo (string) prepareExchangedData( |
3209
|
|
|
array( |
3210
|
|
|
'error' => true, |
3211
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3212
|
|
|
), |
3213
|
|
|
'encode' |
3214
|
|
|
); |
3215
|
|
|
break; |
3216
|
|
|
} |
3217
|
|
|
} |
3218
|
|
|
|
3219
|
|
|
// prepare return array |
3220
|
|
|
$returnArray = [ |
3221
|
|
|
'show_details' => 0, |
3222
|
|
|
'attachments' => [], |
3223
|
|
|
'favourite' => 0, |
3224
|
|
|
'otp_for_item_enabled' => 0, |
3225
|
|
|
'otp_phone_number' => '', |
3226
|
|
|
'otp_secret' => '', |
3227
|
|
|
'users_list' => [], |
3228
|
|
|
'roles_list' => [], |
3229
|
|
|
'has_change_proposal' => 0, |
3230
|
|
|
'setting_restricted_to_roles' => 0, |
3231
|
|
|
'otv_links' => 0, |
3232
|
|
|
]; |
3233
|
|
|
|
3234
|
|
|
// Load item data |
3235
|
|
|
$dataItem = DB::queryFirstRow( |
3236
|
|
|
'SELECT i.*, n.title AS folder_title, o.enabled AS otp_for_item_enabled, o.phone_number AS otp_phone_number, o.secret AS otp_secret |
3237
|
|
|
FROM ' . prefixTable('items') . ' AS i |
3238
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' AS n ON (i.id_tree = n.id) |
3239
|
|
|
LEFT JOIN ' . prefixTable('items_otp') . ' AS o ON (o.item_id = i.id) |
3240
|
|
|
WHERE i.id = %i', |
3241
|
|
|
$inputData['id'] |
3242
|
|
|
); |
3243
|
|
|
|
3244
|
|
|
// check that actual user can access this item |
3245
|
|
|
$restrictionActive = true; |
3246
|
|
|
$restrictedTo = is_null($dataItem['restricted_to']) === false ? array_filter(explode(';', $dataItem['restricted_to'])) : []; |
3247
|
|
|
if ( |
3248
|
|
|
in_array($session->get('user-id'), $restrictedTo) |
3249
|
|
|
|| (((int) $session->get('user-manager') === 1 || (int) $session->get('user-can_manage_all_users') === 1) |
3250
|
|
|
&& (int) $SETTINGS['manager_edit'] === 1) |
3251
|
|
|
) { |
3252
|
|
|
$restrictionActive = false; |
3253
|
|
|
} |
3254
|
|
|
if (empty($dataItem['restricted_to'])) { |
3255
|
|
|
$restrictionActive = false; |
3256
|
|
|
} |
3257
|
|
|
|
3258
|
|
|
// Check if user has a role that is accepted |
3259
|
|
|
$rows_tmp = DB::query( |
3260
|
|
|
'SELECT role_id |
3261
|
|
|
FROM ' . prefixTable('restriction_to_roles') . ' |
3262
|
|
|
WHERE item_id=%i', |
3263
|
|
|
$inputData['id'] |
3264
|
|
|
); |
3265
|
|
|
foreach ($rows_tmp as $rec_tmp) { |
3266
|
|
|
if (in_array($rec_tmp['role_id'], explode(';', $session->get('user-roles')))) { |
3267
|
|
|
$restrictionActive = false; |
3268
|
|
|
} |
3269
|
|
|
} |
3270
|
|
|
|
3271
|
|
|
// check user is admin |
3272
|
|
|
$session__list_restricted_folders_for_items = $session->get('system-list_restricted_folders_for_items') ?? []; |
3273
|
|
|
if ( |
3274
|
|
|
(int) $session->get('user-admin') === 1 |
3275
|
|
|
&& (int) $dataItem['perso'] === 0 |
3276
|
|
|
) { |
3277
|
|
|
$returnArray['show_details'] = 0; |
3278
|
|
|
echo (string) prepareExchangedData( |
3279
|
|
|
$returnArray, |
3280
|
|
|
'encode' |
3281
|
|
|
); |
3282
|
|
|
// Get all expected data about this ITEM |
3283
|
|
|
} else { |
3284
|
|
|
// generate 2d key |
3285
|
|
|
$session->set('user-key_tmp', bin2hex(GenerateCryptKey(16, false, true, true, false, true))); |
3286
|
|
|
|
3287
|
|
|
// Prepare files listing |
3288
|
|
|
$attachments = []; |
3289
|
|
|
|
3290
|
|
|
// launch query |
3291
|
|
|
$rows = DB::query( |
3292
|
|
|
'SELECT id, name, file, extension, size |
3293
|
|
|
FROM ' . prefixTable('files') . ' |
3294
|
|
|
WHERE id_item = %i AND confirmed = 1', |
3295
|
|
|
$inputData['id'] |
3296
|
|
|
); |
3297
|
|
|
foreach ($rows as $record) { |
3298
|
|
|
$filename = basename($record['name'], '.' . $record['extension']); |
3299
|
|
|
$filename = isBase64($filename) === true ? base64_decode($filename) : $filename; |
3300
|
|
|
|
3301
|
|
|
array_push( |
3302
|
|
|
$attachments, |
3303
|
|
|
array( |
3304
|
|
|
'icon' => fileFormatImage(strtolower($record['extension'])), |
3305
|
|
|
'filename' => $filename, |
3306
|
|
|
'extension' => $record['extension'], |
3307
|
|
|
'size' => formatSizeUnits((int) $record['size']), |
3308
|
|
|
'is_image' => in_array(strtolower($record['extension']), TP_IMAGE_FILE_EXT) === true ? 1 : 0, |
3309
|
|
|
'id' => $record['id'], |
3310
|
|
|
'key' => $session->get('user-key_tmp'), |
3311
|
|
|
'internalFilename' => basename($record['name'], '.' . $record['extension']), |
3312
|
|
|
) |
3313
|
|
|
); |
3314
|
|
|
} |
3315
|
|
|
$returnArray['attachments'] = $attachments; |
3316
|
|
|
|
3317
|
|
|
// disable add bookmark if alread bookmarked |
3318
|
|
|
$returnArray['favourite'] = in_array($inputData['id'], $session->get('user-favorites')) === true ? 1 : 0; |
3319
|
|
|
|
3320
|
|
|
// get OTP enabled for item |
3321
|
|
|
$returnArray['otp_for_item_enabled'] = (int) $dataItem['otp_for_item_enabled']; |
3322
|
|
|
$returnArray['otp_phone_number'] = (string) $dataItem['otp_phone_number']; |
3323
|
|
|
if (empty($dataItem['otp_secret']) === false) { |
3324
|
|
|
$secret = cryption( |
3325
|
|
|
$dataItem['otp_secret'], |
3326
|
|
|
'', |
3327
|
|
|
'decrypt' |
3328
|
|
|
)['string']; |
3329
|
|
|
} else { |
3330
|
|
|
$secret = ''; |
3331
|
|
|
} |
3332
|
|
|
$returnArray['otp_secret'] = (string) $secret; |
3333
|
|
|
|
3334
|
|
|
// Add this item to the latests list |
3335
|
|
|
if ($session->has('user-latest_items') && $session->has('user-latest_items') && null !== $session->get('user-latest_items') && isset($SETTINGS['max_latest_items']) && |
3336
|
|
|
in_array($dataItem['id'], $session->get('user-latest_items')) === false |
3337
|
|
|
) { |
3338
|
|
|
if (count($session->get('user-latest_items')) >= $SETTINGS['max_latest_items']) { |
3339
|
|
|
// delete last items |
3340
|
|
|
SessionManager::specificOpsOnSessionArray('user-latest_items', 'pop'); |
3341
|
|
|
} |
3342
|
|
|
SessionManager::specificOpsOnSessionArray('user-latest_items', 'unshift', $dataItem['id']); |
3343
|
|
|
// update DB |
3344
|
|
|
DB::update( |
3345
|
|
|
prefixTable('users'), |
3346
|
|
|
array( |
3347
|
|
|
'latest_items' => implode(';', $session->get('user-latest_items')), |
3348
|
|
|
), |
3349
|
|
|
'id=' . $session->get('user-id') |
3350
|
|
|
); |
3351
|
|
|
} |
3352
|
|
|
|
3353
|
|
|
// get list of roles |
3354
|
|
|
$listOptionsForUsers = array(); |
3355
|
|
|
$listOptionsForRoles = array(); |
3356
|
|
|
$rows = DB::query( |
3357
|
|
|
'SELECT r.role_id AS role_id, t.title AS title |
3358
|
|
|
FROM ' . prefixTable('roles_values') . ' AS r |
3359
|
|
|
INNER JOIN ' . prefixTable('roles_title') . ' AS t ON (r.role_id = t.id) |
3360
|
|
|
WHERE r.folder_id = %i', |
3361
|
|
|
$dataItem['id_tree'] |
3362
|
|
|
); |
3363
|
|
|
foreach ($rows as $record) { |
3364
|
|
|
array_push( |
3365
|
|
|
$listOptionsForRoles, |
3366
|
|
|
array( |
3367
|
|
|
'id' => (int) $record['role_id'], |
3368
|
|
|
'title' => $record['title'], |
3369
|
|
|
) |
3370
|
|
|
); |
3371
|
|
|
$rows2 = DB::query( |
3372
|
|
|
'SELECT id, login, fonction_id, email, name, lastname |
3373
|
|
|
FROM ' . prefixTable('users') . ' |
3374
|
|
|
WHERE fonction_id LIKE %s', |
3375
|
|
|
'%' . $record['role_id'] . '%' |
3376
|
|
|
); |
3377
|
|
|
foreach ($rows2 as $record2) { |
3378
|
|
|
foreach (explode(';', $record2['fonction_id']) as $role) { |
3379
|
|
|
if ( |
3380
|
|
|
array_search($record2['id'], array_column($listOptionsForUsers, 'id')) === false |
3381
|
|
|
&& $role === $record['role_id'] |
3382
|
|
|
) { |
3383
|
|
|
array_push( |
3384
|
|
|
$listOptionsForUsers, |
3385
|
|
|
array( |
3386
|
|
|
'id' => (int) $record2['id'], |
3387
|
|
|
'login' => $record2['login'], |
3388
|
|
|
'name' => $record2['name'] . ' ' . $record2['lastname'], |
3389
|
|
|
'email' => $record2['email'], |
3390
|
|
|
) |
3391
|
|
|
); |
3392
|
|
|
} |
3393
|
|
|
} |
3394
|
|
|
} |
3395
|
|
|
} |
3396
|
|
|
|
3397
|
|
|
$returnArray['users_list'] = $listOptionsForUsers; |
3398
|
|
|
$returnArray['roles_list'] = $listOptionsForRoles; |
3399
|
|
|
|
3400
|
|
|
// send notification if enabled |
3401
|
|
|
if (isset($SETTINGS['enable_email_notification_on_item_shown']) === true && (int) $SETTINGS['enable_email_notification_on_item_shown'] === 1) { |
3402
|
|
|
// Get path |
3403
|
|
|
$arbo = $tree->getPath($dataItem['id_tree'], true); |
3404
|
|
|
$path = ''; |
3405
|
|
|
foreach ($arbo as $elem) { |
3406
|
|
|
if (empty($path) === true) { |
3407
|
|
|
$path = htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES) . ' '; |
3408
|
|
|
} else { |
3409
|
|
|
$path .= '→ ' . htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); |
3410
|
|
|
} |
3411
|
|
|
} |
3412
|
|
|
// Build text to show user |
3413
|
|
|
if (empty($path) === true) { |
3414
|
|
|
$path = addslashes($dataItem['label']); |
3415
|
|
|
} else { |
3416
|
|
|
$path = addslashes($dataItem['label']) . ' (' . $path . ')'; |
3417
|
|
|
} |
3418
|
|
|
|
3419
|
|
|
// Add Admins to notification list if expected |
3420
|
|
|
$reveivers = []; |
3421
|
|
|
$rows = DB::query( |
3422
|
|
|
'SELECT email |
3423
|
|
|
FROM ' . prefixTable('users').' |
3424
|
|
|
WHERE admin = %i', |
3425
|
|
|
1 |
3426
|
|
|
); |
3427
|
|
|
foreach ($rows as $user) { |
3428
|
|
|
array_push($reveivers, $user['email']); |
3429
|
|
|
} |
3430
|
|
|
|
3431
|
|
|
// prepare sending email |
3432
|
|
|
prepareSendingEmail( |
3433
|
|
|
$lang->get('email_on_open_notification_subject'), |
3434
|
|
|
str_replace( |
3435
|
|
|
array('#tp_user#', '#tp_item#', '#tp_link#'), |
3436
|
|
|
array( |
3437
|
|
|
addslashes($session->get('user-login')), |
3438
|
|
|
$path, |
3439
|
|
|
$SETTINGS['cpassman_url'] . '/index.php?page=items&group=' . $dataItem['id_tree'] . '&id=' . $dataItem['id'], |
3440
|
|
|
), |
3441
|
|
|
$lang->get('email_on_open_notification_mail') |
3442
|
|
|
), |
3443
|
|
|
implode(",", $reveivers), |
3444
|
|
|
"" |
3445
|
|
|
); |
3446
|
|
|
} |
3447
|
|
|
|
3448
|
|
|
// has this item a change proposal |
3449
|
|
|
DB::query('SELECT * FROM ' . prefixTable('items_change') . ' WHERE item_id = %i', $inputData['id']); |
3450
|
|
|
$returnArray['has_change_proposal'] = DB::count(); |
3451
|
|
|
|
3452
|
|
|
// Setting |
3453
|
|
|
$returnArray['setting_restricted_to_roles'] = isset($SETTINGS['restricted_to_roles']) === true |
3454
|
|
|
&& (int) $SETTINGS['restricted_to_roles'] === 1 ? 1 : 0; |
3455
|
|
|
|
3456
|
|
|
// get OTV links |
3457
|
|
|
if (isset($SETTINGS['otv_is_enabled']) === true && (int) $SETTINGS['otv_is_enabled'] === 1) { |
3458
|
|
|
DB::query( |
3459
|
|
|
'SELECT * |
3460
|
|
|
FROM ' . prefixTable('otv') . ' |
3461
|
|
|
WHERE item_id = %i |
3462
|
|
|
AND time_limit > %i', |
3463
|
|
|
$inputData['id'], |
3464
|
|
|
time() |
3465
|
|
|
); |
3466
|
|
|
$returnArray['otv_links'] = (int) DB::count(); |
3467
|
|
|
} |
3468
|
|
|
|
3469
|
|
|
$session->set('system-show_step2', false); |
3470
|
|
|
|
3471
|
|
|
// deepcode ignore ServerLeak: Data is encrypted before being sent |
3472
|
|
|
echo (string) prepareExchangedData( |
3473
|
|
|
$returnArray, |
3474
|
|
|
'encode' |
3475
|
|
|
); |
3476
|
|
|
} |
3477
|
|
|
break; |
3478
|
|
|
|
3479
|
|
|
/* |
3480
|
|
|
* CASE |
3481
|
|
|
* Delete an item |
3482
|
|
|
*/ |
3483
|
|
|
case 'delete_item': |
3484
|
|
|
// Check KEY and rights |
3485
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
3486
|
|
|
echo (string) prepareExchangedData( |
3487
|
|
|
array( |
3488
|
|
|
'error' => true, |
3489
|
|
|
'message' => $lang->get('key_is_not_correct'), |
3490
|
|
|
), |
3491
|
|
|
'encode' |
3492
|
|
|
); |
3493
|
|
|
break; |
3494
|
|
|
} |
3495
|
|
|
if ($session->get('user-read_only') === 1) { |
3496
|
|
|
echo (string) prepareExchangedData( |
3497
|
|
|
array( |
3498
|
|
|
'error' => true, |
3499
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3500
|
|
|
), |
3501
|
|
|
'encode' |
3502
|
|
|
); |
3503
|
|
|
break; |
3504
|
|
|
} |
3505
|
|
|
|
3506
|
|
|
// decrypt and retreive data in JSON format |
3507
|
|
|
$dataReceived = prepareExchangedData( |
3508
|
|
|
$inputData['data'], |
3509
|
|
|
'decode' |
3510
|
|
|
); |
3511
|
|
|
|
3512
|
|
|
// Prepare POST variables |
3513
|
|
|
$data = [ |
3514
|
|
|
'itemId' => isset($dataReceived['item_id']) === true ? $dataReceived['item_id'] : '', |
3515
|
|
|
'folderId' => isset($dataReceived['folder_id']) === true ? $dataReceived['folder_id'] : '', |
3516
|
|
|
'accessLevel' => isset($dataReceived['access_level']) === true ? $dataReceived['access_level'] : '', |
3517
|
|
|
'itemKey' => isset($dataReceived['item_key']) === true ? $dataReceived['item_key'] : '', |
3518
|
|
|
]; |
3519
|
|
|
|
3520
|
|
|
$filters = [ |
3521
|
|
|
'itemId' => 'cast:integer', |
3522
|
|
|
'folderId' => 'cast:integer', |
3523
|
|
|
'accessLevel' => 'cast:integer', |
3524
|
|
|
'itemKey' => 'trim|escape', |
3525
|
|
|
]; |
3526
|
|
|
|
3527
|
|
|
$inputData = dataSanitizer( |
3528
|
|
|
$data, |
3529
|
|
|
$filters |
3530
|
|
|
); |
3531
|
|
|
|
3532
|
|
|
if (empty($inputData['itemId']) === true && (empty($inputData['itemKey']) === true || is_null($inputData['itemKey']) === true)) { |
3533
|
|
|
echo (string) prepareExchangedData( |
3534
|
|
|
array( |
3535
|
|
|
'error' => true, |
3536
|
|
|
'message' => $lang->get('nothing_to_do'), |
3537
|
|
|
), |
3538
|
|
|
'encode' |
3539
|
|
|
); |
3540
|
|
|
break; |
3541
|
|
|
} |
3542
|
|
|
|
3543
|
|
|
// Check that user can access this item |
3544
|
|
|
$granted = accessToItemIsGranted($inputData['itemId'], $SETTINGS); |
3545
|
|
|
if ($granted !== true) { |
3546
|
|
|
echo (string) prepareExchangedData( |
3547
|
|
|
array( |
3548
|
|
|
'error' => true, |
3549
|
|
|
'message' => $granted, |
3550
|
|
|
), |
3551
|
|
|
'encode' |
3552
|
|
|
); |
3553
|
|
|
break; |
3554
|
|
|
} |
3555
|
|
|
|
3556
|
|
|
// Load item data |
3557
|
|
|
$data = DB::queryFirstRow( |
3558
|
|
|
'SELECT id_tree, id, label |
3559
|
|
|
FROM ' . prefixTable('items') . ' |
3560
|
|
|
WHERE id = %i OR item_key = %s', |
3561
|
|
|
$inputData['itemId'], |
3562
|
|
|
$inputData['itemKey'] |
3563
|
|
|
); |
3564
|
|
|
if (empty($inputData['itemId']) === true) { |
3565
|
|
|
$inputData['itemId'] = $data['id']; |
3566
|
|
|
} |
3567
|
|
|
$inputData['label'] = $data['label']; |
3568
|
|
|
|
3569
|
|
|
// Check that user can delete on this folder |
3570
|
|
|
$checkRights = getCurrentAccessRights( |
3571
|
|
|
$session->get('user-id'), |
3572
|
|
|
$inputData['itemId'], |
3573
|
|
|
(int) $data['id_tree'], |
3574
|
|
|
); |
3575
|
|
|
|
3576
|
|
|
if ($checkRights['error'] || !$checkRights['delete']) { |
3577
|
|
|
echo (string) prepareExchangedData( |
3578
|
|
|
array( |
3579
|
|
|
'error' => true, |
3580
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3581
|
|
|
), |
3582
|
|
|
'encode' |
3583
|
|
|
); |
3584
|
|
|
} |
3585
|
|
|
|
3586
|
|
|
// delete item consists in disabling it |
3587
|
|
|
DB::update( |
3588
|
|
|
prefixTable('items'), |
3589
|
|
|
array( |
3590
|
|
|
'inactif' => '1', |
3591
|
|
|
'deleted_at' => time(), |
3592
|
|
|
), |
3593
|
|
|
'id = %i OR item_key = %s', |
3594
|
|
|
$inputData['itemId'], |
3595
|
|
|
$inputData['itemKey'] |
3596
|
|
|
); |
3597
|
|
|
|
3598
|
|
|
// log |
3599
|
|
|
logItems( |
3600
|
|
|
$SETTINGS, |
3601
|
|
|
(int) $inputData['itemId'], |
3602
|
|
|
$inputData['label'], |
3603
|
|
|
$session->get('user-id'), |
3604
|
|
|
'at_delete', |
3605
|
|
|
$session->get('user-login') |
3606
|
|
|
); |
3607
|
|
|
// Update CACHE table |
3608
|
|
|
updateCacheTable('delete_value', (int) $inputData['itemId']); |
3609
|
|
|
|
3610
|
|
|
echo (string) prepareExchangedData( |
3611
|
|
|
array( |
3612
|
|
|
'error' => false, |
3613
|
|
|
'message' => '', |
3614
|
|
|
), |
3615
|
|
|
'encode' |
3616
|
|
|
); |
3617
|
|
|
break; |
3618
|
|
|
|
3619
|
|
|
|
3620
|
|
|
/* |
3621
|
|
|
* CASE |
3622
|
|
|
* Display OTP of the selected Item |
3623
|
|
|
*/ |
3624
|
|
|
case 'show_opt_code': |
3625
|
|
|
// Check KEY and rights |
3626
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
3627
|
|
|
echo (string) prepareExchangedData( |
3628
|
|
|
array( |
3629
|
|
|
'error' => true, |
3630
|
|
|
'message' => $lang->get('key_is_not_correct'), |
3631
|
|
|
), |
3632
|
|
|
'encode' |
3633
|
|
|
); |
3634
|
|
|
break; |
3635
|
|
|
} |
3636
|
|
|
if ($session->get('user-read_only') === 1) { |
3637
|
|
|
echo (string) prepareExchangedData( |
3638
|
|
|
array( |
3639
|
|
|
'error' => true, |
3640
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3641
|
|
|
), |
3642
|
|
|
'encode' |
3643
|
|
|
); |
3644
|
|
|
break; |
3645
|
|
|
} |
3646
|
|
|
|
3647
|
|
|
// Load item data |
3648
|
|
|
$dataItem = DB::queryFirstRow( |
3649
|
|
|
'SELECT secret, enabled |
3650
|
|
|
FROM ' . prefixTable('items_otp') . ' |
3651
|
|
|
WHERE item_id = %i', |
3652
|
|
|
$inputData['id'] |
3653
|
|
|
); |
3654
|
|
|
|
3655
|
|
|
if (DB::count() > 0) { |
3656
|
|
|
// OTP exists then display it |
3657
|
|
|
$secret = cryption( |
3658
|
|
|
$dataItem['secret'], |
3659
|
|
|
'', |
3660
|
|
|
'decrypt' |
3661
|
|
|
)['string']; |
3662
|
|
|
} |
3663
|
|
|
|
3664
|
|
|
// Generate OTP code |
3665
|
|
|
if (empty($secret) === false) { |
3666
|
|
|
try { |
3667
|
|
|
$otp = TOTP::createFromSecret($secret); |
3668
|
|
|
$otpCode = $otp->now(); |
3669
|
|
|
$otpExpiresIn = $otp->expiresIn(); |
3670
|
|
|
} catch (RuntimeException $e) { |
3671
|
|
|
$error = true; |
3672
|
|
|
$otpCode = ''; |
3673
|
|
|
$otpExpiresIn = ''; |
3674
|
|
|
$message = $e->getMessage(); |
3675
|
|
|
} |
3676
|
|
|
} else { |
3677
|
|
|
$otpCode = ''; |
3678
|
|
|
$otpExpiresIn = ''; |
3679
|
|
|
} |
3680
|
|
|
|
3681
|
|
|
// deepcode ignore ServerLeak: Data is encrypted before being sent |
3682
|
|
|
echo (string) prepareExchangedData( |
3683
|
|
|
array( |
3684
|
|
|
'error' => isset($error) === true ? $error : false, |
3685
|
|
|
'message' => isset($message) === true ? $message : '', |
3686
|
|
|
'otp_code' => $otpCode, |
3687
|
|
|
'otp_expires_in' => $otpExpiresIn, |
3688
|
|
|
'otp_enabled' => $dataItem['enabled'], |
3689
|
|
|
), |
3690
|
|
|
'encode' |
3691
|
|
|
); |
3692
|
|
|
break; |
3693
|
|
|
|
3694
|
|
|
/* |
3695
|
|
|
* CASE |
3696
|
|
|
* Update a Group |
3697
|
|
|
*/ |
3698
|
|
|
case 'update_folder': |
3699
|
|
|
// Check KEY and rights |
3700
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
3701
|
|
|
echo (string) prepareExchangedData( |
3702
|
|
|
array( |
3703
|
|
|
'error' => true, |
3704
|
|
|
'message' => $lang->get('key_is_not_correct'), |
3705
|
|
|
), |
3706
|
|
|
'encode' |
3707
|
|
|
); |
3708
|
|
|
break; |
3709
|
|
|
} |
3710
|
|
|
if ($session->get('user-read_only') === 1) { |
3711
|
|
|
echo (string) prepareExchangedData( |
3712
|
|
|
array( |
3713
|
|
|
'error' => true, |
3714
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3715
|
|
|
), |
3716
|
|
|
'encode' |
3717
|
|
|
); |
3718
|
|
|
break; |
3719
|
|
|
} |
3720
|
|
|
// decrypt and retreive data in JSON format |
3721
|
|
|
$dataReceived = prepareExchangedData( |
3722
|
|
|
$inputData['data'], |
3723
|
|
|
'decode' |
3724
|
|
|
); |
3725
|
|
|
|
3726
|
|
|
// Prepare variables |
3727
|
|
|
$title = filter_var(htmlspecialchars_decode($dataReceived['title'], ENT_QUOTES), FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
3728
|
|
|
$inputData['folderId'] = filter_var(htmlspecialchars_decode($dataReceived['folder']), FILTER_SANITIZE_NUMBER_INT); |
3729
|
|
|
|
3730
|
|
|
// Check if user is allowed to access this folder |
3731
|
|
|
if (!in_array($inputData['folderId'], $session->get('user-accessible_folders'))) { |
3732
|
|
|
echo '[{"error" : "' . $lang->get('error_not_allowed_to') . '"}]'; |
3733
|
|
|
break; |
3734
|
|
|
} |
3735
|
|
|
|
3736
|
|
|
// Check if title doesn't contains html codes |
3737
|
|
|
if (preg_match_all('|<[^>]+>(.*)</[^>]+>|U', $title, $out)) { |
3738
|
|
|
echo '[ { "error" : "' . $lang->get('error_html_codes') . '" } ]'; |
3739
|
|
|
break; |
3740
|
|
|
} |
3741
|
|
|
// check that title is not numeric |
3742
|
|
|
if (is_numeric($title) === true) { |
3743
|
|
|
echo '[{"error" : "ERR_TITLE_ONLY_WITH_NUMBERS"}]'; |
3744
|
|
|
break; |
3745
|
|
|
} |
3746
|
|
|
|
3747
|
|
|
// Check if duplicate folders name are allowed |
3748
|
|
|
if (isset($SETTINGS['duplicate_folder']) && $SETTINGS['duplicate_folder'] === '0') { |
3749
|
|
|
$data = DB::queryFirstRow('SELECT id, title FROM ' . prefixTable('nested_tree') . ' WHERE title = %s', $title); |
3750
|
|
|
if (empty($data['id']) === false && $dataReceived['folder'] !== $data['id']) { |
3751
|
|
|
echo '[ { "error" : "' . $lang->get('error_group_exist') . '" } ]'; |
3752
|
|
|
break; |
3753
|
|
|
} |
3754
|
|
|
} |
3755
|
|
|
|
3756
|
|
|
// query on folder |
3757
|
|
|
$data = DB::queryFirstRow( |
3758
|
|
|
'SELECT parent_id, personal_folder |
3759
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
3760
|
|
|
WHERE id = %i', |
3761
|
|
|
$inputData['folderId'] |
3762
|
|
|
); |
3763
|
|
|
|
3764
|
|
|
// check if complexity level is good |
3765
|
|
|
// if manager or admin don't care |
3766
|
|
|
if ($session->get('user-admin') !== 1 && $session->get('user-manager') !== 1 && $data['personal_folder'] === '0') { |
3767
|
|
|
$data = DB::queryFirstRow( |
3768
|
|
|
'SELECT valeur |
3769
|
|
|
FROM ' . prefixTable('misc') . ' |
3770
|
|
|
WHERE intitule = %i AND type = %s', |
3771
|
|
|
$data['parent_id'], |
3772
|
|
|
'complex' |
3773
|
|
|
); |
3774
|
|
|
if (intval($dataReceived['complexity']) < intval($data['valeur'])) { |
3775
|
|
|
echo '[ { "error" : "' . $lang->get('error_folder_complexity_lower_than_top_folder') . ' [<b>' . TP_PW_COMPLEXITY[$data['valeur']][1] . '</b>]"} ]'; |
3776
|
|
|
break; |
3777
|
|
|
} |
3778
|
|
|
} |
3779
|
|
|
|
3780
|
|
|
// update Folders table |
3781
|
|
|
$tmp = DB::queryFirstRow( |
3782
|
|
|
'SELECT title, parent_id, personal_folder FROM ' . prefixTable('nested_tree') . ' WHERE id = %i', |
3783
|
|
|
$dataReceived['folder'] |
3784
|
|
|
); |
3785
|
|
|
if ($tmp['parent_id'] !== 0 || $tmp['title'] !== $session->get('user-id') || $tmp['personal_folder'] !== 1) { |
3786
|
|
|
DB::update( |
3787
|
|
|
prefixTable('nested_tree'), |
3788
|
|
|
array( |
3789
|
|
|
'title' => $title, |
3790
|
|
|
), |
3791
|
|
|
'id=%s', |
3792
|
|
|
$inputData['folderId'] |
3793
|
|
|
); |
3794
|
|
|
// update complixity value |
3795
|
|
|
DB::update( |
3796
|
|
|
prefixTable('misc'), |
3797
|
|
|
array( |
3798
|
|
|
'valeur' => $dataReceived['complexity'], |
3799
|
|
|
'updated_at' => time(), |
3800
|
|
|
), |
3801
|
|
|
'intitule = %s AND type = %s', |
3802
|
|
|
$inputData['folderId'], |
3803
|
|
|
'complex' |
3804
|
|
|
); |
3805
|
|
|
// rebuild fuild tree folder |
3806
|
|
|
$tree->rebuild(); |
3807
|
|
|
} |
3808
|
|
|
// send data |
3809
|
|
|
echo '[{"error" : ""}]'; |
3810
|
|
|
break; |
3811
|
|
|
|
3812
|
|
|
/* |
3813
|
|
|
* CASE |
3814
|
|
|
* List items of a group |
3815
|
|
|
*/ |
3816
|
|
|
case 'do_items_list_in_folder': |
3817
|
|
|
// Check KEY and rights |
3818
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
3819
|
|
|
echo (string) prepareExchangedData( |
3820
|
|
|
array( |
3821
|
|
|
'error' => true, |
3822
|
|
|
'message' => $lang->get('error_not_allowed_to')." BOOH 1", |
3823
|
|
|
), |
3824
|
|
|
'encode' |
3825
|
|
|
); |
3826
|
|
|
break; |
3827
|
|
|
} |
3828
|
|
|
|
3829
|
|
|
if (count($session->get('user-roles_array')) === 0) { |
3830
|
|
|
echo (string) prepareExchangedData( |
3831
|
|
|
array( |
3832
|
|
|
'error' => true, |
3833
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
3834
|
|
|
), |
3835
|
|
|
'encode' |
3836
|
|
|
); |
3837
|
|
|
break; |
3838
|
|
|
} |
3839
|
|
|
|
3840
|
|
|
// decrypt and retreive data in JSON format |
3841
|
|
|
$dataReceived = prepareExchangedData( |
3842
|
|
|
$inputData['data'], |
3843
|
|
|
'decode' |
3844
|
|
|
); |
3845
|
|
|
|
3846
|
|
|
if (is_array($dataReceived) === true && array_key_exists('id', $dataReceived) === false) { |
3847
|
|
|
echo (string) prepareExchangedData( |
3848
|
|
|
array( |
3849
|
|
|
'error' => true, |
3850
|
|
|
'message' => $lang->get('error_unknown'), |
3851
|
|
|
), |
3852
|
|
|
'encode' |
3853
|
|
|
); |
3854
|
|
|
break; |
3855
|
|
|
} |
3856
|
|
|
|
3857
|
|
|
// Prepare POST variables |
3858
|
|
|
$inputData['id'] = filter_var($dataReceived['id'], FILTER_SANITIZE_NUMBER_INT); |
3859
|
|
|
$post_restricted = filter_var($dataReceived['restricted'], FILTER_SANITIZE_NUMBER_INT); |
3860
|
|
|
$post_start = filter_var($dataReceived['start'], FILTER_SANITIZE_NUMBER_INT); |
3861
|
|
|
$post_nb_items_to_display_once = filter_var($dataReceived['nb_items_to_display_once'], FILTER_SANITIZE_NUMBER_INT); |
3862
|
|
|
|
3863
|
|
|
$arr_arbo = []; |
3864
|
|
|
$folderIsPf = in_array($inputData['id'], $session->get('user-personal_folders')) === true ? true : false; |
3865
|
|
|
$showError = 0; |
3866
|
|
|
$itemsIDList = $rights = $returnedData = $uniqueLoadData = $html_json = array(); |
3867
|
|
|
// Build query limits |
3868
|
|
|
if (empty($post_start) === true) { |
3869
|
|
|
$start = 0; |
3870
|
|
|
} else { |
3871
|
|
|
$start = $post_start; |
3872
|
|
|
} |
3873
|
|
|
|
3874
|
|
|
// to do only on 1st iteration |
3875
|
|
|
if ((int) $start === 0) { |
3876
|
|
|
// Prepare tree |
3877
|
|
|
$arbo = $tree->getPath($inputData['id'], true); |
3878
|
|
|
foreach ($arbo as $elem) { |
3879
|
|
|
// Personnal folder |
3880
|
|
|
if ((int) $elem->title === (int) $session->get('user-id') && (int) $elem->nlevel === 1) { |
3881
|
|
|
$elem->title = $session->get('user-login'); |
3882
|
|
|
} |
3883
|
|
|
// Store path elements |
3884
|
|
|
array_push( |
3885
|
|
|
$arr_arbo, |
3886
|
|
|
array( |
3887
|
|
|
'id' => $elem->id, |
3888
|
|
|
'title' => htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES), |
3889
|
|
|
'visible' => in_array($elem->id, $session->get('user-accessible_folders')) ? 1 : 0, |
3890
|
|
|
) |
3891
|
|
|
); |
3892
|
|
|
} |
3893
|
|
|
$uniqueLoadData['path'] = $arr_arbo; |
3894
|
|
|
|
3895
|
|
|
// store last folder accessed in cookie |
3896
|
|
|
$arr_cookie_options = array ( |
3897
|
|
|
'expires' => time() + TP_ONE_DAY_SECONDS * 5, |
3898
|
|
|
'path' => '/', |
3899
|
|
|
'secure' => true, |
3900
|
|
|
'httponly' => true, |
3901
|
|
|
'samesite' => 'Lax' // None || Lax || Strict |
3902
|
|
|
); |
3903
|
|
|
// deepcode ignore WebCookieSecureDisabledByDefault: defined in $arr_cookie_options, deepcode ignore WebCookieHttpOnlyDisabledByDefault: defined in $arr_cookie_options |
3904
|
|
|
setcookie('jstree_select', $inputData['id'], $arr_cookie_options); |
3905
|
|
|
|
3906
|
|
|
// CHeck if roles have 'allow_pw_change' set to true |
3907
|
|
|
$forceItemEditPrivilege = false; |
3908
|
|
|
foreach ($session->get('user-roles_array') as $role) { |
3909
|
|
|
$roleQ = DB::queryFirstRow( |
3910
|
|
|
'SELECT allow_pw_change |
3911
|
|
|
FROM ' . prefixTable('roles_title') . ' |
3912
|
|
|
WHERE id = %i', |
3913
|
|
|
$role |
3914
|
|
|
); |
3915
|
|
|
if ((int) $roleQ['allow_pw_change'] === 1) { |
3916
|
|
|
$forceItemEditPrivilege = true; |
3917
|
|
|
break; |
3918
|
|
|
} |
3919
|
|
|
} |
3920
|
|
|
|
3921
|
|
|
// is this folder a personal one |
3922
|
|
|
$folder_is_personal = in_array($inputData['id'], $session->get('user-personal_folders')); |
3923
|
|
|
$uniqueLoadData['folder_is_personal'] = $folder_is_personal; |
3924
|
|
|
|
3925
|
|
|
$folder_is_in_personal = in_array( |
3926
|
|
|
$inputData['id'], |
3927
|
|
|
array_merge( |
3928
|
|
|
$session->get('user-personal_visible_folders'), |
3929
|
|
|
$session->get('user-personal_folders') |
3930
|
|
|
) |
3931
|
|
|
); |
3932
|
|
|
$uniqueLoadData['folder_is_in_personal'] = $folder_is_in_personal; |
3933
|
|
|
|
3934
|
|
|
|
3935
|
|
|
// check role access on this folder (get the most restrictive) (2.1.23) |
3936
|
|
|
if ((int) $folder_is_personal === 0) { |
3937
|
|
|
$accessLevel = 20; |
3938
|
|
|
$arrTmp = []; |
3939
|
|
|
|
3940
|
|
|
foreach ($session->get('user-roles_array') as $role) { |
3941
|
|
|
$access = DB::queryFirstRow( |
3942
|
|
|
'SELECT type FROM ' . prefixTable('roles_values') . ' WHERE role_id = %i AND folder_id = %i', |
3943
|
|
|
$role, |
3944
|
|
|
$inputData['id'] |
3945
|
|
|
); |
3946
|
|
|
if (DB::count()>0) { |
3947
|
|
|
if ($access['type'] === 'R') { |
3948
|
|
|
array_push($arrTmp, 10); |
3949
|
|
|
} elseif ($access['type'] === 'W') { |
3950
|
|
|
array_push($arrTmp, 30); |
3951
|
|
|
} elseif ( |
3952
|
|
|
$access['type'] === 'ND' |
3953
|
|
|
|| ($forceItemEditPrivilege === true && $access['type'] === 'NDNE') |
3954
|
|
|
) { |
3955
|
|
|
array_push($arrTmp, 20); |
3956
|
|
|
} elseif ($access['type'] === 'NE') { |
3957
|
|
|
array_push($arrTmp, 10); |
3958
|
|
|
} elseif ($access['type'] === 'NDNE') { |
3959
|
|
|
array_push($arrTmp, 15); |
3960
|
|
|
} else { |
3961
|
|
|
// Ensure to give access Right if allowed folder |
3962
|
|
|
if (in_array($inputData['id'], $session->get('user-accessible_folders')) === true) { |
3963
|
|
|
array_push($arrTmp, 30); |
3964
|
|
|
} else { |
3965
|
|
|
array_push($arrTmp, 0); |
3966
|
|
|
} |
3967
|
|
|
} |
3968
|
|
|
} else { |
3969
|
|
|
// Ensure to give access Right if allowed folder |
3970
|
|
|
if (in_array($inputData['id'], $session->get('user-accessible_folders')) === true) { |
3971
|
|
|
array_push($arrTmp, 50); |
3972
|
|
|
} else { |
3973
|
|
|
array_push($arrTmp, 0); |
3974
|
|
|
} |
3975
|
|
|
} |
3976
|
|
|
} |
3977
|
|
|
// 3.0.0.0 - changed MIN to MAX |
3978
|
|
|
$accessLevel = count($arrTmp) > 0 ? max($arrTmp) : $accessLevel; |
3979
|
|
|
} else { |
3980
|
|
|
$accessLevel = 30; |
3981
|
|
|
} |
3982
|
|
|
$uniqueLoadData['accessLevel'] = $accessLevel; |
3983
|
|
|
$uniqueLoadData['showError'] = $showError; |
3984
|
|
|
|
3985
|
|
|
// check if items exist |
3986
|
|
|
$where = new WhereClause('and'); |
3987
|
|
|
$session__user_list_folders_limited = $session->get('user-list_folders_limited'); |
3988
|
|
|
if (null !== $post_restricted && (int) $post_restricted === 1 && empty($session__user_list_folders_limited[$inputData['id']]) === false) { |
3989
|
|
|
$counter = count($session__user_list_folders_limited[$inputData['id']]); |
3990
|
|
|
$uniqueLoadData['counter'] = $counter; |
3991
|
|
|
// check if this folder is visible |
3992
|
|
|
} elseif (!in_array( |
3993
|
|
|
$inputData['id'], |
3994
|
|
|
array_merge( |
3995
|
|
|
$session->get('user-accessible_folders'), |
3996
|
|
|
array_keys($session->get('system-list_restricted_folders_for_items')), |
3997
|
|
|
array_keys($session->get('user-list_folders_limited')) |
3998
|
|
|
) |
3999
|
|
|
)) { |
4000
|
|
|
echo (string) prepareExchangedData( |
4001
|
|
|
array( |
4002
|
|
|
'error' => 'not_authorized', |
4003
|
|
|
'arborescence' => $arr_arbo, |
4004
|
|
|
), |
4005
|
|
|
'encode' |
4006
|
|
|
); |
4007
|
|
|
break; |
4008
|
|
|
} else { |
4009
|
|
|
DB::query( |
4010
|
|
|
'SELECT * |
4011
|
|
|
FROM ' . prefixTable('items') . ' |
4012
|
|
|
WHERE inactif = %i', |
4013
|
|
|
0 |
4014
|
|
|
); |
4015
|
|
|
$counter = DB::count(); |
4016
|
|
|
$uniqueLoadData['counter'] = $counter; |
4017
|
|
|
} |
4018
|
|
|
|
4019
|
|
|
// Get folder complexity |
4020
|
|
|
$folderComplexity = DB::queryFirstRow( |
4021
|
|
|
'SELECT valeur FROM ' . prefixTable('misc') . ' WHERE type = %s AND intitule = %i', |
4022
|
|
|
'complex', |
4023
|
|
|
$inputData['id'] |
4024
|
|
|
); |
4025
|
|
|
$folderComplexity = $folderComplexity !== null ? (int) $folderComplexity['valeur'] : 0; |
4026
|
|
|
$uniqueLoadData['folderComplexity'] = $folderComplexity; |
4027
|
|
|
|
4028
|
|
|
// Has this folder some categories to be displayed? |
4029
|
|
|
$categoriesStructure = array(); |
4030
|
|
|
if (isset($SETTINGS['item_extra_fields']) && (int) $SETTINGS['item_extra_fields'] === 1) { |
4031
|
|
|
$folderRow = DB::query( |
4032
|
|
|
'SELECT id_category |
4033
|
|
|
FROM ' . prefixTable('categories_folders') . ' |
4034
|
|
|
WHERE id_folder = %i', |
4035
|
|
|
$inputData['id'] |
4036
|
|
|
); |
4037
|
|
|
foreach ($folderRow as $category) { |
4038
|
|
|
array_push( |
4039
|
|
|
$categoriesStructure, |
4040
|
|
|
$category['id_category'] |
4041
|
|
|
); |
4042
|
|
|
} |
4043
|
|
|
} |
4044
|
|
|
$uniqueLoadData['categoriesStructure'] = $categoriesStructure; |
4045
|
|
|
|
4046
|
|
|
/*$categoriesStructure = array(); |
4047
|
|
|
if (isset($SETTINGS['item_extra_fields']) && (int) $SETTINGS['item_extra_fields'] === 1) { |
4048
|
|
|
$folderRow = DB::query( |
4049
|
|
|
'SELECT f.id_category, c.title AS title |
4050
|
|
|
FROM '.prefixTable('categories_folders').' AS f |
4051
|
|
|
INNER JOIN '.prefixTable('categories').' AS c ON (c.id = f.id_category) |
4052
|
|
|
WHERE f.id_folder = %i', |
4053
|
|
|
$inputData['id'] |
4054
|
|
|
); |
4055
|
|
|
foreach ($folderRow as $category) { |
4056
|
|
|
$arrFields = array(); |
4057
|
|
|
// Get each category definition with fields |
4058
|
|
|
$categoryRow = DB::query( |
4059
|
|
|
"SELECT * |
4060
|
|
|
FROM ".prefixTable("categories")." |
4061
|
|
|
WHERE parent_id=%i |
4062
|
|
|
ORDER BY `order` ASC", |
4063
|
|
|
$category['id_category'] |
4064
|
|
|
); |
4065
|
|
|
|
4066
|
|
|
if (DB::count() > 0) { |
4067
|
|
|
foreach ($categoryRow as $field) { |
4068
|
|
|
// Is this Field visibile by user? |
4069
|
|
|
if ($field['role_visibility'] === 'all' |
4070
|
|
|
|| count( |
4071
|
|
|
array_intersect( |
4072
|
|
|
explode(';', $session->get('user-roles')), |
4073
|
|
|
explode(',', $field['role_visibility']) |
4074
|
|
|
) |
4075
|
|
|
) > 0 |
4076
|
|
|
) { |
4077
|
|
|
array_push( |
4078
|
|
|
$arrFields, |
4079
|
|
|
array( |
4080
|
|
|
$field['id'], |
4081
|
|
|
$field['title'], |
4082
|
|
|
$field['encrypted_data'], |
4083
|
|
|
$field['type'], |
4084
|
|
|
$field['masked'], |
4085
|
|
|
$field['is_mandatory'] |
4086
|
|
|
) |
4087
|
|
|
); |
4088
|
|
|
} |
4089
|
|
|
} |
4090
|
|
|
} |
4091
|
|
|
|
4092
|
|
|
// store the categories |
4093
|
|
|
array_push( |
4094
|
|
|
$categoriesStructure, |
4095
|
|
|
array( |
4096
|
|
|
$category['id_category'], |
4097
|
|
|
$category['title'], |
4098
|
|
|
$arrFields |
4099
|
|
|
) |
4100
|
|
|
); |
4101
|
|
|
} |
4102
|
|
|
} |
4103
|
|
|
$uniqueLoadData['categoriesStructure'] = $categoriesStructure; |
4104
|
|
|
*/ |
4105
|
|
|
|
4106
|
|
|
if ($session->has('system-list_folders_editable_by_role') && $session->has('system-list_folders_editable_by_role') && null !== $session->get('system-list_folders_editable_by_role')) { |
4107
|
|
|
$list_folders_editable_by_role = in_array($inputData['id'], $session->get('system-list_folders_editable_by_role')); |
4108
|
|
|
} else { |
4109
|
|
|
$list_folders_editable_by_role = ''; |
4110
|
|
|
} |
4111
|
|
|
$uniqueLoadData['list_folders_editable_by_role'] = $list_folders_editable_by_role; |
4112
|
|
|
} else { |
4113
|
|
|
$uniqueLoadData = json_decode( |
4114
|
|
|
filter_var($dataReceived['uniqueLoadData'], FILTER_UNSAFE_RAW), |
4115
|
|
|
true |
4116
|
|
|
); |
4117
|
|
|
|
4118
|
|
|
// initialize main variables |
4119
|
|
|
$showError = $uniqueLoadData['showError']; |
4120
|
|
|
$accessLevel = $uniqueLoadData['accessLevel']; |
4121
|
|
|
$counter = $uniqueLoadData['counter']; |
4122
|
|
|
$counter_full = $uniqueLoadData['counter_full']; |
4123
|
|
|
$categoriesStructure = $uniqueLoadData['categoriesStructure']; |
4124
|
|
|
$folderComplexity = $uniqueLoadData['folderComplexity']; |
4125
|
|
|
$folder_is_personal = $uniqueLoadData['folder_is_personal']; |
4126
|
|
|
$folder_is_in_personal = $uniqueLoadData['folder_is_in_personal']; |
4127
|
|
|
//$list_folders_editable_by_role = $uniqueLoadData['list_folders_editable_by_role']; |
4128
|
|
|
} |
4129
|
|
|
|
4130
|
|
|
// prepare query WHere conditions |
4131
|
|
|
$where = new WhereClause('and'); |
4132
|
|
|
$session__user_list_folders_limited = $session->get('user-list_folders_limited'); |
4133
|
|
|
if (null !== $post_restricted && (int) $post_restricted === 1 && empty($session__user_list_folders_limited[$inputData['id']]) === false) { |
4134
|
|
|
$where->add('i.id IN %ls', $session__user_list_folders_limited[$inputData['id']]); |
4135
|
|
|
} else { |
4136
|
|
|
$where->add('i.id_tree=%i', $inputData['id']); |
4137
|
|
|
} |
4138
|
|
|
|
4139
|
|
|
// build the HTML for this set of Items |
4140
|
|
|
if ($counter > 0 && empty($showError)) { |
4141
|
|
|
// init variables |
4142
|
|
|
$expired_item = false; |
4143
|
|
|
$limited_to_items = ''; |
4144
|
|
|
|
4145
|
|
|
// List all ITEMS |
4146
|
|
|
if ($folderIsPf === false) { |
4147
|
|
|
$where->add('i.inactif=%i', 0); |
4148
|
|
|
$sql_e='(SELECT date FROM ' . prefixTable('log_items') |
4149
|
|
|
. " WHERE action = 'at_creation' AND id_item=i.id " |
4150
|
|
|
. 'union all SELECT date FROM '. prefixTable('log_items') |
4151
|
|
|
. " WHERE action = 'at_modification' AND raison = 'at_pw' |
4152
|
|
|
AND id_item=i.id ORDER BY date DESC LIMIT 1)"; |
4153
|
|
|
$where->add('l.date=%l', $sql_e); |
4154
|
|
|
|
4155
|
|
|
$query_limit = ' LIMIT ' . |
4156
|
|
|
$start . ',' . |
4157
|
|
|
$post_nb_items_to_display_once; |
4158
|
|
|
//db::debugmode(true); |
4159
|
|
|
$rows = DB::query( |
4160
|
|
|
'SELECT i.id AS id, i.item_key AS item_key, MIN(i.restricted_to) AS restricted_to, MIN(i.perso) AS perso, |
4161
|
|
|
MIN(i.label) AS label, MIN(i.description) AS description, MIN(i.pw) AS pw, MIN(i.login) AS login, |
4162
|
|
|
MIN(i.anyone_can_modify) AS anyone_can_modify, l.date AS date, i.id_tree AS tree_id, i.fa_icon AS fa_icon, |
4163
|
|
|
MIN(n.renewal_period) AS renewal_period, |
4164
|
|
|
MIN(l.action) AS log_action, |
4165
|
|
|
l.id_user AS log_user, |
4166
|
|
|
i.url AS link, |
4167
|
|
|
i.email AS email |
4168
|
|
|
FROM ' . prefixTable('items') . ' AS i |
4169
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' AS n ON (i.id_tree = n.id) |
4170
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' AS l ON (i.id = l.id_item) |
4171
|
|
|
WHERE %l |
4172
|
|
|
GROUP BY i.id, l.date, l.id_user, l.action |
4173
|
|
|
ORDER BY i.label ASC, l.date DESC' . $query_limit, |
4174
|
|
|
$where |
4175
|
|
|
); |
4176
|
|
|
//db::debugmode(false); |
4177
|
|
|
} else { |
4178
|
|
|
$post_nb_items_to_display_once = 'max'; |
4179
|
|
|
$where->add('i.inactif=%i', 0); |
4180
|
|
|
|
4181
|
|
|
$rows = DB::query( |
4182
|
|
|
'SELECT i.id AS id, i.item_key AS item_key, MIN(i.restricted_to) AS restricted_to, MIN(i.perso) AS perso, |
4183
|
|
|
MIN(i.label) AS label, MIN(i.description) AS description, MIN(i.pw) AS pw, MIN(i.login) AS login, |
4184
|
|
|
MIN(i.anyone_can_modify) AS anyone_can_modify,l.date AS date, i.id_tree AS tree_id, i.fa_icon AS fa_icon, |
4185
|
|
|
MIN(n.renewal_period) AS renewal_period, |
4186
|
|
|
MIN(l.action) AS log_action, |
4187
|
|
|
l.id_user AS log_user, |
4188
|
|
|
i.url AS link, |
4189
|
|
|
i.email AS email |
4190
|
|
|
FROM ' . prefixTable('items') . ' AS i |
4191
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' AS n ON (i.id_tree = n.id) |
4192
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' AS l ON (i.id = l.id_item) |
4193
|
|
|
WHERE %l |
4194
|
|
|
GROUP BY i.id, l.date, l.id_user, l.action |
4195
|
|
|
ORDER BY i.label ASC, l.date DESC', |
4196
|
|
|
$where |
4197
|
|
|
); |
4198
|
|
|
} |
4199
|
|
|
|
4200
|
|
|
$idManaged = ''; |
4201
|
|
|
|
4202
|
|
|
foreach ($rows as $record) { |
4203
|
|
|
// exclude all results except the first one returned by query |
4204
|
|
|
if (empty($idManaged) === true || $idManaged !== $record['id']) { |
4205
|
|
|
// Fix a bug on Personal Item creation - field `perso` must be set to `1` |
4206
|
|
|
if ((int) $record['perso'] !== 1 && (int) $folder_is_personal === 1) { |
4207
|
|
|
DB::update( |
4208
|
|
|
prefixTable('items'), |
4209
|
|
|
array( |
4210
|
|
|
'perso' => 1, |
4211
|
|
|
'updated_at' => time(), |
4212
|
|
|
), |
4213
|
|
|
'id=%i', |
4214
|
|
|
$record['id'] |
4215
|
|
|
); |
4216
|
|
|
$record['perso'] = 1; |
4217
|
|
|
} |
4218
|
|
|
|
4219
|
|
|
// Does this item has restriction to groups of users? |
4220
|
|
|
$item_is_restricted_to_role = false; |
4221
|
|
|
DB::queryFirstRow( |
4222
|
|
|
'SELECT role_id |
4223
|
|
|
FROM ' . prefixTable('restriction_to_roles') . ' |
4224
|
|
|
WHERE item_id = %i', |
4225
|
|
|
$record['id'] |
4226
|
|
|
); |
4227
|
|
|
if (DB::count() > 0) { |
4228
|
|
|
$item_is_restricted_to_role = true; |
4229
|
|
|
} |
4230
|
|
|
|
4231
|
|
|
// Has this item a restriction to Groups of Users |
4232
|
|
|
$user_is_included_in_role = false; |
4233
|
|
|
DB::query( |
4234
|
|
|
'SELECT role_id |
4235
|
|
|
FROM ' . prefixTable('restriction_to_roles') . ' |
4236
|
|
|
WHERE item_id = %i AND role_id IN %ls', |
4237
|
|
|
$record['id'], |
4238
|
|
|
$session->get('user-roles_array') |
4239
|
|
|
); |
4240
|
|
|
if (DB::count() > 0) { |
4241
|
|
|
$user_is_included_in_role = true; |
4242
|
|
|
} |
4243
|
|
|
|
4244
|
|
|
// Is user in restricted list of users |
4245
|
|
|
if (empty($record['restricted_to']) === false) { |
4246
|
|
|
if ( |
4247
|
|
|
in_array($session->get('user-id'), explode(';', $record['restricted_to'])) === true |
4248
|
|
|
|| (((int) $session->get('user-manager') === 1 || (int) $session->get('user-can_manage_all_users') === 1) |
4249
|
|
|
&& (int) $SETTINGS['manager_edit'] === 1) |
4250
|
|
|
) { |
4251
|
|
|
$user_is_in_restricted_list = true; |
4252
|
|
|
} else { |
4253
|
|
|
$user_is_in_restricted_list = false; |
4254
|
|
|
} |
4255
|
|
|
} else { |
4256
|
|
|
$user_is_in_restricted_list = false; |
4257
|
|
|
} |
4258
|
|
|
|
4259
|
|
|
// Get Expiration date |
4260
|
|
|
$expired_item = 0; |
4261
|
|
|
if ( |
4262
|
|
|
(int) $SETTINGS['activate_expiration'] === 1 |
4263
|
|
|
&& $record['renewal_period'] > 0 |
4264
|
|
|
&& ($record['date'] + ($record['renewal_period'] * TP_ONE_MONTH_SECONDS)) < time() |
4265
|
|
|
) { |
4266
|
|
|
$expired_item = 1; |
4267
|
|
|
} |
4268
|
|
|
// Init |
4269
|
|
|
$html_json[$record['id']]['expired'] = (int) $expired_item; |
4270
|
|
|
$html_json[$record['id']]['item_id'] = (int) $record['id']; |
4271
|
|
|
$html_json[$record['id']]['item_key'] = (string) $record['item_key']; |
4272
|
|
|
$html_json[$record['id']]['tree_id'] = (int) $record['tree_id']; |
4273
|
|
|
$html_json[$record['id']]['label'] = strip_tags($record['label']); |
4274
|
|
|
if (isset($SETTINGS['show_description']) === true && (int) $SETTINGS['show_description'] === 1 && is_null($record['description']) === false && empty($record['description']) === false) { |
4275
|
|
|
$html_json[$record['id']]['desc'] = mb_substr(preg_replace('#<[^>]+>#', ' ', $record['description']), 0, 200); |
4276
|
|
|
} else { |
4277
|
|
|
$html_json[$record['id']]['desc'] = ''; |
4278
|
|
|
} |
4279
|
|
|
$html_json[$record['id']]['login'] = $record['login']; |
4280
|
|
|
$html_json[$record['id']]['anyone_can_modify'] = (int) $record['anyone_can_modify']; |
4281
|
|
|
$html_json[$record['id']]['is_result_of_search'] = 0; |
4282
|
|
|
$html_json[$record['id']]['is_favourited'] = in_array($record['id'], $session->get('user-favorites')) === true ? 1 : 0; |
4283
|
|
|
$html_json[$record['id']]['link'] = $record['link']; |
4284
|
|
|
$html_json[$record['id']]['email'] = $record['email'] ?? ''; |
4285
|
|
|
$html_json[$record['id']]['fa_icon'] = $record['fa_icon']; |
4286
|
|
|
$html_json[$record['id']]['user_restriction_allowed_for_user'] = ((!empty($record['restricted_to']) && $user_is_in_restricted_list === true) || empty($record['restricted_to'])) ? true : false; |
4287
|
|
|
|
4288
|
|
|
// Possible values: |
4289
|
|
|
// 0 -> no access to item |
4290
|
|
|
// 10 -> appears in list but no view |
4291
|
|
|
// 20 -> can view without edit (no copy) or move |
4292
|
|
|
// 30 -> can view without edit (no copy) but can move |
4293
|
|
|
// 40 -> can edit but not move |
4294
|
|
|
// 50 -> can edit and move |
4295
|
|
|
$itemIsPersonal = false; |
4296
|
|
|
|
4297
|
|
|
// Let's identify the rights belonging to this ITEM |
4298
|
|
|
if ( |
4299
|
|
|
(int) $record['perso'] === 1 |
4300
|
|
|
&& $record['log_action'] === 'at_creation' |
4301
|
|
|
&& $record['log_user'] === $session->get('user-id') |
4302
|
|
|
&& (int) $folder_is_in_personal === 1 |
4303
|
|
|
&& (int) $folder_is_personal === 1 |
4304
|
|
|
) { |
4305
|
|
|
// Case 1 - Is this item personal and user its owner? |
4306
|
|
|
// If yes then allow |
4307
|
|
|
// If no then continue |
4308
|
|
|
$itemIsPersonal = true; |
4309
|
|
|
$right = 70; |
4310
|
|
|
// --- |
4311
|
|
|
// ----- END CASE 1 ----- |
4312
|
|
|
} elseif ((($session->has('user-manager') && (int) $session->get('user-manager') && $session->has('user-manager') && (int) $session->get('user-manager') && null !== $session->get('user-manager') && (int) $session->get('user-manager') === 1) |
4313
|
|
|
|| ($session->has('user-can_manage_all_users') && (int) $session->get('user-can_manage_all_users') && $session->has('user-can_manage_all_users') && (int) $session->get('user-can_manage_all_users') && null !== $session->get('user-can_manage_all_users') && (int) $session->get('user-can_manage_all_users') === 1)) |
4314
|
|
|
&& (isset($SETTINGS['manager_edit']) === true && (int) $SETTINGS['manager_edit'] === 1) |
4315
|
|
|
&& (int) $record['perso'] !== 1 |
4316
|
|
|
&& $user_is_in_restricted_list === true |
4317
|
|
|
) { |
4318
|
|
|
// Case 2 - Is user manager and option "manager_edit" set to true? |
4319
|
|
|
// Allow all rights |
4320
|
|
|
$right = 70; |
4321
|
|
|
// --- |
4322
|
|
|
// ----- END CASE 2 ----- |
4323
|
|
|
} elseif ( |
4324
|
|
|
(int) $record['anyone_can_modify'] === 1 |
4325
|
|
|
&& (int) $record['perso'] !== 1 |
4326
|
|
|
&& (int) $session->get('user-read_only') === 0 |
4327
|
|
|
) { |
4328
|
|
|
// Case 3 - Has this item the setting "anyone can modify" set to true? |
4329
|
|
|
// Allow all rights |
4330
|
|
|
$right = 70; |
4331
|
|
|
// --- |
4332
|
|
|
// ----- END CASE 3 ----- |
4333
|
|
|
} elseif ( |
4334
|
|
|
$user_is_in_restricted_list === true |
4335
|
|
|
&& (int) $record['perso'] !== 1 |
4336
|
|
|
&& (int) $session->get('user-read_only') === 0 |
4337
|
|
|
) { |
4338
|
|
|
// Case 4 - Is this item limited to Users? Is current user in this list? |
4339
|
|
|
// Allow all rights |
4340
|
|
|
$right = 70; |
4341
|
|
|
// --- |
4342
|
|
|
// ----- END CASE 4 ----- |
4343
|
|
|
} elseif ( |
4344
|
|
|
$user_is_included_in_role === true |
4345
|
|
|
&& (int) $record['perso'] !== 1 |
4346
|
|
|
&& (int) $session->get('user-read_only') === 0 |
4347
|
|
|
) { |
4348
|
|
|
// Case 5 - Is this item limited to group of users? Is current user in one of those groups? |
4349
|
|
|
// Allow all rights |
4350
|
|
|
$right = 60; |
4351
|
|
|
// --- |
4352
|
|
|
// ----- END CASE 5 ----- |
4353
|
|
|
} elseif ( |
4354
|
|
|
(int) $record['perso'] !== 1 |
4355
|
|
|
&& (int) $session->get('user-read_only') === 1 |
4356
|
|
|
) { |
4357
|
|
|
// Case 6 - Is user readonly? |
4358
|
|
|
// Allow limited rights |
4359
|
|
|
$right = 10; |
4360
|
|
|
// --- |
4361
|
|
|
// ----- END CASE 6 ----- |
4362
|
|
|
} elseif ( |
4363
|
|
|
(int) $record['perso'] !== 1 |
4364
|
|
|
&& in_array($record['tree_id'], $session->get('user-allowed_folders_by_definition')) |
4365
|
|
|
) { |
4366
|
|
|
// Case 7 - Is folder allowed by definition for this user? |
4367
|
|
|
// Allow limited rights |
4368
|
|
|
$right = 70; |
4369
|
|
|
// --- |
4370
|
|
|
// ----- END CASE 7 ----- |
4371
|
|
|
} elseif ( |
4372
|
|
|
(int) $record['perso'] !== 1 |
4373
|
|
|
&& (int) $session->get('user-read_only') === 1 |
4374
|
|
|
) { |
4375
|
|
|
// Case 8 - Is user allowed to access? |
4376
|
|
|
// Allow rights |
4377
|
|
|
$right = 10; |
4378
|
|
|
// --- |
4379
|
|
|
// ----- END CASE 8 ----- |
4380
|
|
|
} elseif (($user_is_included_in_role === false && $item_is_restricted_to_role === true) |
4381
|
|
|
&& (int) $record['perso'] !== 1 |
4382
|
|
|
&& (int) $session->get('user-read_only') === 0 |
4383
|
|
|
) { |
4384
|
|
|
// Case 9 - Is this item limited to Users or Groups? Is current user in this list? |
4385
|
|
|
// If no then Allow none |
4386
|
|
|
$right = 10; |
4387
|
|
|
// --- |
4388
|
|
|
// ----- END CASE 9 ----- |
4389
|
|
|
} else { |
4390
|
|
|
// Define the access based upon setting on folder |
4391
|
|
|
// 0 -> no access to item |
4392
|
|
|
// 10 -> appears in list but no view |
4393
|
|
|
// 20 -> can view without edit (no copy) or move or delete |
4394
|
|
|
// 30 -> can view without edit (no copy) or delete but can move |
4395
|
|
|
// 40 -> can edit but not move and not delete |
4396
|
|
|
// 50 -> can edit and delete but not move |
4397
|
|
|
// 60 -> can edit and move but not delete |
4398
|
|
|
// 70 -> can edit and move |
4399
|
|
|
if ((int) $accessLevel === 0) { |
4400
|
|
|
$right = 0; |
4401
|
|
|
} elseif ((10 <= (int) $accessLevel) && ((int) $accessLevel < 20)) { |
4402
|
|
|
$right = 20; |
4403
|
|
|
} elseif ((20 <= (int) $accessLevel) && ((int) $accessLevel < 30)) { |
4404
|
|
|
$right = 60; |
4405
|
|
|
} elseif ((int) $accessLevel >= 30) { |
4406
|
|
|
$right = 70; |
4407
|
|
|
} else { |
4408
|
|
|
$right = 10; |
4409
|
|
|
} |
4410
|
|
|
} |
4411
|
|
|
|
4412
|
|
|
// Is drag and drop enabled? |
4413
|
|
|
$dragDrop = (int) $SETTINGS['disable_drag_drop'] !== 1; |
4414
|
|
|
|
4415
|
|
|
// Now finalize the data to send back |
4416
|
|
|
$html_json[$record['id']]['rights'] = $right; |
4417
|
|
|
$html_json[$record['id']]['perso'] = 'fa-tag mi-red'; |
4418
|
|
|
$html_json[$record['id']]['sk'] = $itemIsPersonal === true ? 1 : 0; |
4419
|
|
|
$html_json[$record['id']]['display'] = $right > 0 ? 1 : 0; |
4420
|
|
|
$html_json[$record['id']]['open_edit'] = in_array($right, array(40, 50, 60, 70)) === true ? 1 : 0; |
4421
|
|
|
$html_json[$record['id']]['canMove'] = in_array($right, array(30, 60, 70)) === true ? (int) $dragDrop : 0; |
4422
|
|
|
|
4423
|
|
|
//*************** */ |
4424
|
|
|
|
4425
|
|
|
// Build array with items |
4426
|
|
|
array_push( |
4427
|
|
|
$itemsIDList, |
4428
|
|
|
array( |
4429
|
|
|
'id' => (int) $record['id'], |
4430
|
|
|
//'display' => $displayItem, |
4431
|
|
|
'edit' => $html_json[$record['id']]['open_edit'], |
4432
|
|
|
) |
4433
|
|
|
); |
4434
|
|
|
} |
4435
|
|
|
$idManaged = $record['id']; |
4436
|
|
|
} |
4437
|
|
|
|
4438
|
|
|
$rights = recupDroitCreationSansComplexite((int) $inputData['id']); |
4439
|
|
|
} |
4440
|
|
|
|
4441
|
|
|
// DELETE - 2.1.19 - AND (l.action = 'at_creation' OR (l.action = 'at_modification' AND l.raison LIKE 'at_pw :%')) |
4442
|
|
|
// count |
4443
|
|
|
if ((int) $start === 0) { |
4444
|
|
|
DB::query( |
4445
|
|
|
'SELECT i.id |
4446
|
|
|
FROM ' . prefixTable('items') . ' as i |
4447
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' as n ON (i.id_tree = n.id) |
4448
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (i.id = l.id_item) |
4449
|
|
|
WHERE %l |
4450
|
|
|
ORDER BY i.label ASC, l.date DESC', |
4451
|
|
|
$where |
4452
|
|
|
); |
4453
|
|
|
$counter_full = DB::count(); |
4454
|
|
|
$uniqueLoadData['counter_full'] = $counter_full; |
4455
|
|
|
} |
4456
|
|
|
|
4457
|
|
|
// Check list to be continued status |
4458
|
|
|
if ($post_nb_items_to_display_once !== 'max' && ($post_nb_items_to_display_once + $start) < $counter_full) { |
4459
|
|
|
$listToBeContinued = 'yes'; |
4460
|
|
|
} else { |
4461
|
|
|
$listToBeContinued = 'end'; |
4462
|
|
|
} |
4463
|
|
|
|
4464
|
|
|
// Prepare returned values |
4465
|
|
|
$returnValues = array( |
4466
|
|
|
'html_json' => $html_json, |
4467
|
|
|
//'folder_requests_psk' => $findPfGroup, |
4468
|
|
|
'arborescence' => $arr_arbo, |
4469
|
|
|
'array_items' => $itemsIDList, |
4470
|
|
|
'error' => $showError, |
4471
|
|
|
//'saltkey_is_required' => $folderIsPf === true ? 1 : 0, |
4472
|
|
|
'show_clipboard_small_icons' => isset($SETTINGS['copy_to_clipboard_small_icons']) && (int) $SETTINGS['copy_to_clipboard_small_icons'] === 1 ? 1 : 0, |
4473
|
|
|
'next_start' => intval($post_nb_items_to_display_once) + intval($start), |
4474
|
|
|
'list_to_be_continued' => $listToBeContinued, |
4475
|
|
|
'items_count' => $counter, |
4476
|
|
|
'counter_full' => $counter_full, |
4477
|
|
|
'folder_complexity' => (int) $folderComplexity, |
4478
|
|
|
'categoriesStructure' => $categoriesStructure, |
4479
|
|
|
'access_level' => $accessLevel, |
4480
|
|
|
'IsPersonalFolder' => $folderIsPf === true ? 1 : 0, |
4481
|
|
|
'uniqueLoadData' => json_encode($uniqueLoadData), |
4482
|
|
|
); |
4483
|
|
|
// Check if $rights is not null |
4484
|
|
|
if (count($rights) > 0) { |
4485
|
|
|
$returnValues = array_merge($returnValues, $rights); |
4486
|
|
|
} |
4487
|
|
|
|
4488
|
|
|
// Encrypt data to return |
4489
|
|
|
echo (string) prepareExchangedData( |
4490
|
|
|
$returnValues, |
4491
|
|
|
'encode' |
4492
|
|
|
); |
4493
|
|
|
|
4494
|
|
|
break; |
4495
|
|
|
|
4496
|
|
|
case 'get_item_password': |
4497
|
|
|
// Check KEY |
4498
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
4499
|
|
|
echo (string) prepareExchangedData( |
4500
|
|
|
array( |
4501
|
|
|
'error' => true, |
4502
|
|
|
'message' => $lang->get('key_is_not_correct'), |
4503
|
|
|
), |
4504
|
|
|
'encode' |
4505
|
|
|
); |
4506
|
|
|
break; |
4507
|
|
|
} |
4508
|
|
|
|
4509
|
|
|
// Get item details and its sharekey |
4510
|
|
|
$dataItem = DB::queryFirstRow( |
4511
|
|
|
'SELECT i.pw AS pw, s.share_key AS share_key, i.id AS id, |
4512
|
|
|
i.label AS label, i.id_tree AS id_tree |
4513
|
|
|
FROM ' . prefixTable('items') . ' AS i |
4514
|
|
|
INNER JOIN ' . prefixTable('sharekeys_items') . ' AS s ON (s.object_id = i.id) |
4515
|
|
|
WHERE user_id = %i AND (i.item_key = %s OR i.id = %i)', |
4516
|
|
|
$session->get('user-id'), |
4517
|
|
|
$inputData['itemKey'] ?? '', |
4518
|
|
|
$inputData['itemId'] ?? 0 |
4519
|
|
|
); |
4520
|
|
|
|
4521
|
|
|
// Check if password item exists |
4522
|
|
|
if (DB::count() === 0) { |
4523
|
|
|
echo (string) prepareExchangedData( |
4524
|
|
|
[ |
4525
|
|
|
'error' => true, |
4526
|
|
|
'password' => '', |
4527
|
|
|
'password_error' => $lang->get('password_is_empty'), |
4528
|
|
|
], |
4529
|
|
|
'encode' |
4530
|
|
|
); |
4531
|
|
|
break; |
4532
|
|
|
} |
4533
|
|
|
|
4534
|
|
|
// Get user access rights |
4535
|
|
|
$userAccess = getCurrentAccessRights( |
4536
|
|
|
(int) $session->get('user-id'), |
4537
|
|
|
(int) $dataItem['id'], |
4538
|
|
|
(int) $dataItem['id_tree'] |
4539
|
|
|
)['access']; |
4540
|
|
|
|
4541
|
|
|
// List of allowed actions |
4542
|
|
|
$allowedActions = [ |
4543
|
|
|
'at_password_copied', |
4544
|
|
|
'at_password_shown', |
4545
|
|
|
'at_password_shown_edit_form', |
4546
|
|
|
]; |
4547
|
|
|
|
4548
|
|
|
// User not allowed to see this password or invalid action provided |
4549
|
|
|
if ($userAccess !== true |
4550
|
|
|
|| empty($inputData['action']) |
4551
|
|
|
|| !in_array($inputData['action'], $allowedActions, true)) { |
4552
|
|
|
|
4553
|
|
|
echo (string) prepareExchangedData( |
4554
|
|
|
[ |
4555
|
|
|
'error' => true, |
4556
|
|
|
'password' => '', |
4557
|
|
|
'password_error' => $lang->get('not_allowed_to_see_pw'), |
4558
|
|
|
], |
4559
|
|
|
'encode' |
4560
|
|
|
); |
4561
|
|
|
break; |
4562
|
|
|
} |
4563
|
|
|
|
4564
|
|
|
// Log the action on password |
4565
|
|
|
logItems( |
4566
|
|
|
$SETTINGS, |
4567
|
|
|
(int) $dataItem['id'], |
4568
|
|
|
$dataItem['label'], |
4569
|
|
|
(int) $session->get('user-id'), |
4570
|
|
|
$inputData['action'], // Filtered by array of allowed values |
4571
|
|
|
$session->get('user-login') |
4572
|
|
|
); |
4573
|
|
|
|
4574
|
|
|
// Uncrypt PW if sharekey is available (empty password otherwise) |
4575
|
|
|
$pw = ''; |
4576
|
|
|
if (!empty($dataItem['share_key'])) { |
4577
|
|
|
$pw = doDataDecryption( |
4578
|
|
|
$dataItem['pw'], |
4579
|
|
|
decryptUserObjectKey( |
4580
|
|
|
$dataItem['share_key'], |
4581
|
|
|
$session->get('user-private_key') |
4582
|
|
|
) |
4583
|
|
|
); |
4584
|
|
|
} |
4585
|
|
|
|
4586
|
|
|
$returnValues = array( |
4587
|
|
|
'error' => false, |
4588
|
|
|
'password' => $pw, |
4589
|
|
|
'password_error' => '', |
4590
|
|
|
); |
4591
|
|
|
|
4592
|
|
|
// Encrypt data to return |
4593
|
|
|
echo (string) prepareExchangedData( |
4594
|
|
|
$returnValues, |
4595
|
|
|
'encode' |
4596
|
|
|
); |
4597
|
|
|
break; |
4598
|
|
|
|
4599
|
|
|
/* |
4600
|
|
|
* CASE |
4601
|
|
|
* Get complexity level of a group |
4602
|
|
|
*/ |
4603
|
|
|
case 'get_complixity_level': |
4604
|
|
|
// get some info about ITEM |
4605
|
|
|
if (null !== $inputData['itemId'] && empty($inputData['itemId']) === false) { |
4606
|
|
|
// Is this item locked? |
4607
|
|
|
$itemIsLocked = isItemLocked((int) $inputData['itemId'], $session, (int) $session->get('user-id')); |
4608
|
|
|
if ($itemIsLocked['status'] === true) { |
4609
|
|
|
$returnValues = array( |
4610
|
|
|
'error' => true, |
4611
|
|
|
'message' => $lang->get('error_no_edition_possible_locked'), |
4612
|
|
|
'delay' => $itemIsLocked['delay'], |
4613
|
|
|
); |
4614
|
|
|
echo (string) prepareExchangedData( |
4615
|
|
|
$returnValues, |
4616
|
|
|
'encode' |
4617
|
|
|
); |
4618
|
|
|
break; |
4619
|
|
|
} |
4620
|
|
|
} |
4621
|
|
|
|
4622
|
|
|
// do query on this folder |
4623
|
|
|
$data_this_folder = DB::queryFirstRow( |
4624
|
|
|
'SELECT id, personal_folder, title |
4625
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
4626
|
|
|
WHERE id = %s', |
4627
|
|
|
$inputData['folderId'] |
4628
|
|
|
); |
4629
|
|
|
|
4630
|
|
|
// check if user can perform this action |
4631
|
|
|
if ( |
4632
|
|
|
null !== $inputData['context'] |
4633
|
|
|
&& empty($inputData['context']) === false |
4634
|
|
|
) { |
4635
|
|
|
if ( |
4636
|
|
|
$inputData['context'] === 'create_folder' |
4637
|
|
|
|| $inputData['context'] === 'edit_folder' |
4638
|
|
|
|| $inputData['context'] === 'delete_folder' |
4639
|
|
|
|| $inputData['context'] === 'copy_folder' |
4640
|
|
|
) { |
4641
|
|
|
if ( |
4642
|
|
|
(int) $session->get('user-admin') !== 1 |
4643
|
|
|
&& ((int) $session->get('user-manager') !== 1) |
4644
|
|
|
&& (isset($SETTINGS['enable_user_can_create_folders']) |
4645
|
|
|
&& (int) $SETTINGS['enable_user_can_create_folders'] !== 1) |
4646
|
|
|
&& ((int) $data_this_folder['personal_folder'] !== 1 && $data_this_folder['title'] !== $session->get('user-id')) // take into consideration if this is a personal folder |
4647
|
|
|
) { |
4648
|
|
|
$returnValues = array( |
4649
|
|
|
'error' => true, |
4650
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
4651
|
|
|
); |
4652
|
|
|
echo (string) prepareExchangedData( |
4653
|
|
|
$returnValues, |
4654
|
|
|
'encode' |
4655
|
|
|
); |
4656
|
|
|
break; |
4657
|
|
|
} |
4658
|
|
|
} |
4659
|
|
|
} |
4660
|
|
|
|
4661
|
|
|
// Get required Complexity for this Folder |
4662
|
|
|
$visibilite = ''; |
4663
|
|
|
$data = DB::queryFirstRow( |
4664
|
|
|
'SELECT m.valeur, n.personal_folder |
4665
|
|
|
FROM ' . prefixTable('misc') . ' AS m |
4666
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' AS n ON (m.intitule = n.id) |
4667
|
|
|
WHERE type=%s AND intitule = %s', |
4668
|
|
|
'complex', |
4669
|
|
|
$inputData['folderId'] |
4670
|
|
|
); |
4671
|
|
|
|
4672
|
|
|
if (isset($data['valeur']) === true && (empty($data['valeur']) === false || $data['valeur'] === '0')) { |
4673
|
|
|
$complexity = TP_PW_COMPLEXITY[$data['valeur']][1]; |
4674
|
|
|
$folder_is_personal = (int) $data['personal_folder']; |
4675
|
|
|
|
4676
|
|
|
// Prepare Item actual visibility (what Users/Roles can see it) |
4677
|
|
|
$rows = DB::query( |
4678
|
|
|
'SELECT t.title |
4679
|
|
|
FROM ' . prefixTable('roles_values') . ' as v |
4680
|
|
|
INNER JOIN ' . prefixTable('roles_title') . ' as t ON (v.role_id = t.id) |
4681
|
|
|
WHERE v.folder_id = %i |
4682
|
|
|
GROUP BY title', |
4683
|
|
|
$inputData['folderId'] |
4684
|
|
|
); |
4685
|
|
|
foreach ($rows as $record) { |
4686
|
|
|
if (empty($visibilite)) { |
4687
|
|
|
$visibilite = $record['title']; |
4688
|
|
|
} else { |
4689
|
|
|
$visibilite .= ' - ' . $record['title']; |
4690
|
|
|
} |
4691
|
|
|
} |
4692
|
|
|
} else { |
4693
|
|
|
$complexity = $lang->get('not_defined'); |
4694
|
|
|
|
4695
|
|
|
// if not defined, then previous query failed and personal_folder is null |
4696
|
|
|
// do new query to know if current folder is pf |
4697
|
|
|
$data_pf = DB::queryFirstRow( |
4698
|
|
|
'SELECT personal_folder |
4699
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
4700
|
|
|
WHERE id = %s', |
4701
|
|
|
$inputData['folderId'] |
4702
|
|
|
); |
4703
|
|
|
|
4704
|
|
|
$folder_is_personal = $data_pf !== null ? (int) $data_pf['personal_folder'] : 0; |
4705
|
|
|
|
4706
|
|
|
$visibilite = $session->get('user-name') . ' ' . $session->get('user-lastname') . ' (' . $session->get('user-login') . ')'; |
4707
|
|
|
} |
4708
|
|
|
|
4709
|
|
|
recupDroitCreationSansComplexite($inputData['folderId']); |
4710
|
|
|
|
4711
|
|
|
// get list of roles |
4712
|
|
|
$listOptionsForUsers = array(); |
4713
|
|
|
$listOptionsForRoles = array(); |
4714
|
|
|
$rows = DB::query( |
4715
|
|
|
'SELECT r.role_id AS role_id, t.title AS title |
4716
|
|
|
FROM ' . prefixTable('roles_values') . ' AS r |
4717
|
|
|
INNER JOIN ' . prefixTable('roles_title') . ' AS t ON (r.role_id = t.id) |
4718
|
|
|
WHERE r.folder_id = %i', |
4719
|
|
|
$inputData['folderId'] |
4720
|
|
|
); |
4721
|
|
|
foreach ($rows as $record) { |
4722
|
|
|
array_push( |
4723
|
|
|
$listOptionsForRoles, |
4724
|
|
|
array( |
4725
|
|
|
'id' => $record['role_id'], |
4726
|
|
|
'title' => $record['title'], |
4727
|
|
|
) |
4728
|
|
|
); |
4729
|
|
|
$rows2 = DB::query( |
4730
|
|
|
'SELECT id, login, fonction_id, email, name, lastname |
4731
|
|
|
FROM ' . prefixTable('users') . ' |
4732
|
|
|
WHERE admin = 0 AND fonction_id is not null' |
4733
|
|
|
); |
4734
|
|
|
foreach ($rows2 as $record2) { |
4735
|
|
|
foreach (explode(';', $record2['fonction_id']) as $role) { |
4736
|
|
|
if ( |
4737
|
|
|
array_search($record2['id'], array_column($listOptionsForUsers, 'id')) === false |
4738
|
|
|
&& $role === $record['role_id'] |
4739
|
|
|
) { |
4740
|
|
|
array_push( |
4741
|
|
|
$listOptionsForUsers, |
4742
|
|
|
array( |
4743
|
|
|
'id' => $record2['id'], |
4744
|
|
|
'login' => $record2['login'], |
4745
|
|
|
'name' => $record2['name'] . ' ' . $record2['lastname'], |
4746
|
|
|
'email' => $record2['email'], |
4747
|
|
|
) |
4748
|
|
|
); |
4749
|
|
|
} |
4750
|
|
|
} |
4751
|
|
|
} |
4752
|
|
|
} |
4753
|
|
|
|
4754
|
|
|
// Get access level for this folder |
4755
|
|
|
$accessLevel = 0; |
4756
|
|
|
if ($folder_is_personal === 0) { |
4757
|
|
|
$arrTmp = []; |
4758
|
|
|
$session->set('user-roles_array', explode(';', $session->get('user-roles'))); |
4759
|
|
|
foreach ($session->get('user-roles_array') as $role) { |
4760
|
|
|
$access = DB::queryFirstRow( |
4761
|
|
|
'SELECT type |
4762
|
|
|
FROM ' . prefixTable('roles_values') . ' |
4763
|
|
|
WHERE role_id = %i AND folder_id = %i', |
4764
|
|
|
$role, |
4765
|
|
|
$inputData['folderId'] |
4766
|
|
|
); |
4767
|
|
|
if (DB::count()>0) { |
4768
|
|
|
if ($access['type'] === 'R') { |
4769
|
|
|
array_push($arrTmp, 10); |
4770
|
|
|
} elseif ($access['type'] === 'W') { |
4771
|
|
|
array_push($arrTmp, 30); |
4772
|
|
|
} elseif ($access['type'] === 'ND') { |
4773
|
|
|
array_push($arrTmp, 20); |
4774
|
|
|
} elseif ($access['type'] === 'NE') { |
4775
|
|
|
array_push($arrTmp, 10); |
4776
|
|
|
} elseif ($access['type'] === 'NDNE') { |
4777
|
|
|
array_push($arrTmp, 15); |
4778
|
|
|
} else { |
4779
|
|
|
// Ensure to give access Right if allowed folder |
4780
|
|
|
if (in_array($inputData['id'], $session->get('user-accessible_folders')) === true) { |
4781
|
|
|
array_push($arrTmp, 30); |
4782
|
|
|
} else { |
4783
|
|
|
array_push($arrTmp, 0); |
4784
|
|
|
} |
4785
|
|
|
} |
4786
|
|
|
} |
4787
|
|
|
} |
4788
|
|
|
// 3.0.0.0 - changed MIN to MAX |
4789
|
|
|
$accessLevel = count($arrTmp) > 0 ? max($arrTmp) : $accessLevel; |
4790
|
|
|
} elseif ($folder_is_personal === 1) { |
4791
|
|
|
|
4792
|
|
|
// Check if personal folder is owned by user |
4793
|
|
|
$folder = DB::queryFirstRow( |
4794
|
|
|
'SELECT id |
4795
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
4796
|
|
|
WHERE title = %s', |
4797
|
|
|
$session->get('user-id'), |
4798
|
|
|
); |
4799
|
|
|
|
4800
|
|
|
if ($folder) { |
4801
|
|
|
// Get all subfolders of user personal folder |
4802
|
|
|
$ids = $tree->getDescendants($folder['id'], true, false, true); |
4803
|
|
|
|
4804
|
|
|
// This folder is owned by user |
4805
|
|
|
if (in_array($inputData['folderId'], $ids)) |
4806
|
|
|
$accessLevel = 30; |
4807
|
|
|
} |
4808
|
|
|
} |
4809
|
|
|
|
4810
|
|
|
// Access is not allowed to this folder |
4811
|
|
|
if ($accessLevel === 0) { |
4812
|
|
|
echo (string) prepareExchangedData( |
4813
|
|
|
[ |
4814
|
|
|
'error' => true, |
4815
|
|
|
'message' => $lang->get('error_not_allowed_to_access_this_folder'), |
4816
|
|
|
], |
4817
|
|
|
'encode' |
4818
|
|
|
); |
4819
|
|
|
break; |
4820
|
|
|
} |
4821
|
|
|
|
4822
|
|
|
$returnValues = array( |
4823
|
|
|
'folderId' => (int) $inputData['folderId'], |
4824
|
|
|
'error' => false, |
4825
|
|
|
'val' => $data !== null ? (int) $data['valeur'] : 0, |
4826
|
|
|
'visibility' => $visibilite, |
4827
|
|
|
'complexity' => $complexity, |
4828
|
|
|
'personal' => $folder_is_personal, |
4829
|
|
|
'usersList' => $listOptionsForUsers, |
4830
|
|
|
'rolesList' => $listOptionsForRoles, |
4831
|
|
|
'setting_restricted_to_roles' => isset($SETTINGS['restricted_to_roles']) === true |
4832
|
|
|
&& (int) $SETTINGS['restricted_to_roles'] === 1 ? 1 : 0, |
4833
|
|
|
'itemAccessRight' => $accessLevel, |
4834
|
|
|
); |
4835
|
|
|
echo (string) prepareExchangedData( |
4836
|
|
|
$returnValues, |
4837
|
|
|
'encode' |
4838
|
|
|
); |
4839
|
|
|
break; |
4840
|
|
|
|
4841
|
|
|
case 'handle_item_edition_lock': |
4842
|
|
|
// Check KEY |
4843
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
4844
|
|
|
echo (string) prepareExchangedData( |
4845
|
|
|
array( |
4846
|
|
|
'error' => true, |
4847
|
|
|
'message' => $lang->get('key_is_not_correct'), |
4848
|
|
|
), |
4849
|
|
|
'encode' |
4850
|
|
|
); |
4851
|
|
|
break; |
4852
|
|
|
} |
4853
|
|
|
|
4854
|
|
|
// decrypt and retreive data in JSON format |
4855
|
|
|
$dataReceived = prepareExchangedData( |
4856
|
|
|
$inputData['data'], |
4857
|
|
|
'decode' |
4858
|
|
|
); |
4859
|
|
|
$itemId = filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
4860
|
|
|
$action = filter_var($dataReceived['action'], FILTER_SANITIZE_SPECIAL_CHARS); |
4861
|
|
|
|
4862
|
|
|
if ($action === 'release_lock') { |
4863
|
|
|
DB::delete( |
4864
|
|
|
prefixTable('items_edition'), |
4865
|
|
|
'item_id = %i AND user_id = %i', |
4866
|
|
|
$itemId, |
4867
|
|
|
$session->get('user-id') |
4868
|
|
|
); |
4869
|
|
|
} |
4870
|
|
|
|
4871
|
|
|
break; |
4872
|
|
|
|
4873
|
|
|
/* |
4874
|
|
|
* CASE |
4875
|
|
|
* DELETE attached file from an item |
4876
|
|
|
*/ |
4877
|
|
|
case 'delete_attached_file': |
4878
|
|
|
// Check KEY |
4879
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
4880
|
|
|
echo (string) prepareExchangedData( |
4881
|
|
|
array( |
4882
|
|
|
'error' => true, |
4883
|
|
|
'message' => $lang->get('key_is_not_correct'), |
4884
|
|
|
), |
4885
|
|
|
'encode' |
4886
|
|
|
); |
4887
|
|
|
break; |
4888
|
|
|
} |
4889
|
|
|
|
4890
|
|
|
// decrypt and retreive data in JSON format |
4891
|
|
|
$dataReceived = prepareExchangedData( |
4892
|
|
|
$inputData['data'], |
4893
|
|
|
'decode' |
4894
|
|
|
); |
4895
|
|
|
$fileId = filter_var($dataReceived['file_id'], FILTER_SANITIZE_NUMBER_INT); |
4896
|
|
|
|
4897
|
|
|
// Get some info before deleting |
4898
|
|
|
$data = DB::queryFirstRow( |
4899
|
|
|
'SELECT name, id_item, file |
4900
|
|
|
FROM ' . prefixTable('files') . ' |
4901
|
|
|
WHERE id = %i', |
4902
|
|
|
$fileId |
4903
|
|
|
); |
4904
|
|
|
|
4905
|
|
|
// Load item data |
4906
|
|
|
$data_item = DB::queryFirstRow( |
4907
|
|
|
'SELECT id_tree |
4908
|
|
|
FROM ' . prefixTable('items') . ' |
4909
|
|
|
WHERE id = %i', |
4910
|
|
|
$data['id_item'] |
4911
|
|
|
); |
4912
|
|
|
|
4913
|
|
|
// Check that user can access this folder |
4914
|
|
|
if (in_array($data_item['id_tree'], $session->get('user-accessible_folders')) === false) { |
4915
|
|
|
echo (string) prepareExchangedData( |
4916
|
|
|
array('error' => 'ERR_FOLDER_NOT_ALLOWED'), |
4917
|
|
|
'encode' |
4918
|
|
|
); |
4919
|
|
|
break; |
4920
|
|
|
} |
4921
|
|
|
|
4922
|
|
|
if (empty($data['id_item']) === false) { |
4923
|
|
|
// Delete from FILES table |
4924
|
|
|
DB::delete( |
4925
|
|
|
prefixTable('files'), |
4926
|
|
|
'id = %i', |
4927
|
|
|
$fileId |
4928
|
|
|
); |
4929
|
|
|
|
4930
|
|
|
// Update the log |
4931
|
|
|
logItems( |
4932
|
|
|
$SETTINGS, |
4933
|
|
|
(int) $data['id_item'], |
4934
|
|
|
$data['name'], |
4935
|
|
|
$session->get('user-id'), |
4936
|
|
|
'at_modification', |
4937
|
|
|
$session->get('user-login'), |
4938
|
|
|
'at_del_file : ' . $data['name'] |
4939
|
|
|
); |
4940
|
|
|
|
4941
|
|
|
// DElete sharekeys |
4942
|
|
|
DB::delete( |
4943
|
|
|
prefixTable('sharekeys_files'), |
4944
|
|
|
'object_id = %i', |
4945
|
|
|
$fileId |
4946
|
|
|
); |
4947
|
|
|
|
4948
|
|
|
// Delete file from server |
4949
|
|
|
$fileToDelete = $SETTINGS['path_to_upload_folder'] . '/' . TP_FILE_PREFIX . base64_decode($data['file']); |
4950
|
|
|
$fileToDelete = realpath($fileToDelete); |
4951
|
|
|
if ($fileToDelete && strpos($fileToDelete, $SETTINGS['path_to_upload_folder']) === 0) { |
4952
|
|
|
fileDelete($fileToDelete, $SETTINGS); |
4953
|
|
|
} |
4954
|
|
|
} |
4955
|
|
|
|
4956
|
|
|
echo (string) prepareExchangedData( |
4957
|
|
|
array( |
4958
|
|
|
'error' => false, |
4959
|
|
|
'message' => '', |
4960
|
|
|
), |
4961
|
|
|
'encode' |
4962
|
|
|
); |
4963
|
|
|
break; |
4964
|
|
|
|
4965
|
|
|
/* |
4966
|
|
|
* FUNCTION |
4967
|
|
|
* Launch an action when clicking on a quick icon |
4968
|
|
|
* $action = 0 => Make not favorite |
4969
|
|
|
* $action = 1 => Make favorite |
4970
|
|
|
*/ |
4971
|
|
|
case 'action_on_quick_icon': |
4972
|
|
|
// Check KEY and rights |
4973
|
|
|
if ( |
4974
|
|
|
$inputData['key'] !== $session->get('key') |
4975
|
|
|
|| $session->get('user-read_only') === 1 || !isset($SETTINGS['pwd_maximum_length']) |
4976
|
|
|
) { |
4977
|
|
|
// error |
4978
|
|
|
exit; |
4979
|
|
|
} |
4980
|
|
|
|
4981
|
|
|
// decrypt and retreive data in JSON format |
4982
|
|
|
$dataReceived = prepareExchangedData( |
4983
|
|
|
$inputData['data'], |
4984
|
|
|
'decode' |
4985
|
|
|
); |
4986
|
|
|
$inputData['action'] = (int) filter_var($dataReceived['action'], FILTER_SANITIZE_NUMBER_INT); |
4987
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
4988
|
|
|
|
4989
|
|
|
if ((int) $inputData['action'] === 0) { |
4990
|
|
|
// Add new favourite |
4991
|
|
|
SessionManager::addRemoveFromSessionArray('user-favorites', [$inputData['itemId']], 'add'); |
4992
|
|
|
DB::update( |
4993
|
|
|
prefixTable('users'), |
4994
|
|
|
array( |
4995
|
|
|
'favourites' => implode(';', $session->get('user-favorites')), |
4996
|
|
|
), |
4997
|
|
|
'id = %i', |
4998
|
|
|
$session->get('user-id') |
4999
|
|
|
); |
5000
|
|
|
// Update SESSION with this new favourite |
5001
|
|
|
$data = DB::queryFirstRow( |
5002
|
|
|
'SELECT label,id_tree |
5003
|
|
|
FROM ' . prefixTable('items') . ' |
5004
|
|
|
WHERE id = %i', |
5005
|
|
|
$inputData['itemId'] |
5006
|
|
|
); |
5007
|
|
|
SessionManager::addRemoveFromSessionAssociativeArray( |
5008
|
|
|
'user-favorites_tab', |
5009
|
|
|
[ |
5010
|
|
|
$inputData['itemId'] => [ |
5011
|
|
|
'label' => $data['label'], |
5012
|
|
|
'url' => 'index.php?page=items&group=' . $data['id_tree'] . '&id=' . $inputData['itemId'], |
5013
|
|
|
], |
5014
|
|
|
], |
5015
|
|
|
'add' |
5016
|
|
|
); |
5017
|
|
|
} elseif ((int) $inputData['action'] === 1) { |
5018
|
|
|
// delete from session |
5019
|
|
|
SessionManager::addRemoveFromSessionArray('user-favorites', [$inputData['itemId']], 'remove'); |
5020
|
|
|
|
5021
|
|
|
// delete from DB |
5022
|
|
|
DB::update( |
5023
|
|
|
prefixTable('users'), |
5024
|
|
|
array( |
5025
|
|
|
'favourites' => implode(';', $session->get('user-favorites')), |
5026
|
|
|
), |
5027
|
|
|
'id = %i', |
5028
|
|
|
$session->get('user-id') |
5029
|
|
|
); |
5030
|
|
|
// refresh session fav list |
5031
|
|
|
if ($session->has('user-favorites_tab') && $session->has('user-favorites_tab') && null !== $session->get('user-favorites_tab')) { |
5032
|
|
|
$user_favorites_tab = $session->get('user-favorites_tab'); |
5033
|
|
|
foreach ($user_favorites_tab as $key => $value) { |
5034
|
|
|
if ($key === $inputData['id']) { |
5035
|
|
|
SessionManager::addRemoveFromSessionAssociativeArray('user-favorites_tab', [$key], 'remove'); |
5036
|
|
|
break; |
5037
|
|
|
} |
5038
|
|
|
} |
5039
|
|
|
} |
5040
|
|
|
} |
5041
|
|
|
break; |
5042
|
|
|
|
5043
|
|
|
/* |
5044
|
|
|
* CASE |
5045
|
|
|
* Move an ITEM |
5046
|
|
|
*/ |
5047
|
|
|
case 'move_item': |
5048
|
|
|
// Check KEY and rights |
5049
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
5050
|
|
|
echo (string) prepareExchangedData( |
5051
|
|
|
array( |
5052
|
|
|
'error' => true, |
5053
|
|
|
'message' => $lang->get('key_is_not_correct'), |
5054
|
|
|
), |
5055
|
|
|
'encode' |
5056
|
|
|
); |
5057
|
|
|
break; |
5058
|
|
|
} |
5059
|
|
|
if ($session->get('user-read_only') === 1 || isset($SETTINGS['pwd_maximum_length']) === false) { |
5060
|
|
|
echo (string) prepareExchangedData( |
5061
|
|
|
array( |
5062
|
|
|
'error' => true, |
5063
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5064
|
|
|
), |
5065
|
|
|
'encode' |
5066
|
|
|
); |
5067
|
|
|
break; |
5068
|
|
|
} |
5069
|
|
|
|
5070
|
|
|
// decrypt and retreive data in JSON format |
5071
|
|
|
$dataReceived = prepareExchangedData( |
5072
|
|
|
$inputData['data'], |
5073
|
|
|
'decode' |
5074
|
|
|
); |
5075
|
|
|
$inputData['folderId'] = (int) filter_var($dataReceived['folder_id'], FILTER_SANITIZE_NUMBER_INT); |
5076
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
5077
|
|
|
|
5078
|
|
|
// get data about item |
5079
|
|
|
$dataSource = DB::queryFirstRow( |
5080
|
|
|
'SELECT i.pw, f.personal_folder,i.id_tree, f.title,i.label |
5081
|
|
|
FROM ' . prefixTable('items') . ' as i |
5082
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' as f ON (i.id_tree=f.id) |
5083
|
|
|
WHERE i.id=%i', |
5084
|
|
|
$inputData['itemId'] |
5085
|
|
|
); |
5086
|
|
|
|
5087
|
|
|
// Check that user can delete on old folder |
5088
|
|
|
$checkRights = getCurrentAccessRights( |
5089
|
|
|
$session->get('user-id'), |
5090
|
|
|
$inputData['itemId'], |
5091
|
|
|
(int) $dataSource['id_tree'], |
5092
|
|
|
); |
5093
|
|
|
|
5094
|
|
|
if ($checkRights['error'] || !$checkRights['delete']) { |
5095
|
|
|
echo (string) prepareExchangedData( |
5096
|
|
|
array( |
5097
|
|
|
'error' => true, |
5098
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5099
|
|
|
), |
5100
|
|
|
'encode' |
5101
|
|
|
); |
5102
|
|
|
break; |
5103
|
|
|
} |
5104
|
|
|
|
5105
|
|
|
// Check that user can write on requested folder |
5106
|
|
|
$checkRights = getCurrentAccessRights( |
5107
|
|
|
$session->get('user-id'), |
5108
|
|
|
$inputData['itemId'], |
5109
|
|
|
$inputData['folderId'], |
5110
|
|
|
); |
5111
|
|
|
|
5112
|
|
|
if ($checkRights['error'] || !$checkRights['edit']) { |
5113
|
|
|
echo (string) prepareExchangedData( |
5114
|
|
|
array( |
5115
|
|
|
'error' => true, |
5116
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5117
|
|
|
), |
5118
|
|
|
'encode' |
5119
|
|
|
); |
5120
|
|
|
break; |
5121
|
|
|
} |
5122
|
|
|
|
5123
|
|
|
// get data about new folder |
5124
|
|
|
$dataDestination = DB::queryFirstRow( |
5125
|
|
|
'SELECT personal_folder, title |
5126
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
5127
|
|
|
WHERE id = %i', |
5128
|
|
|
$inputData['folderId'] |
5129
|
|
|
); |
5130
|
|
|
|
5131
|
|
|
// Check that user can access this folder |
5132
|
|
|
if ( |
5133
|
|
|
in_array($dataSource['id_tree'], $session->get('user-accessible_folders')) === false |
5134
|
|
|
|| in_array($inputData['folderId'], $session->get('user-accessible_folders')) === false |
5135
|
|
|
//|| (int) $dataSource['personal_folder'] === (int) $dataDestination['personal_folder'] |
5136
|
|
|
) { |
5137
|
|
|
echo (string) prepareExchangedData( |
5138
|
|
|
array( |
5139
|
|
|
'error' => true, |
5140
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5141
|
|
|
), |
5142
|
|
|
'encode' |
5143
|
|
|
); |
5144
|
|
|
break; |
5145
|
|
|
} |
5146
|
|
|
|
5147
|
|
|
// Manage possible cases |
5148
|
|
|
if ((int) $dataSource['personal_folder'] === 0 && (int) $dataDestination['personal_folder'] === 0) { |
5149
|
|
|
// Previous is non personal folder and new too |
5150
|
|
|
// Just update is needed. Item key is the same |
5151
|
|
|
DB::update( |
5152
|
|
|
prefixTable('items'), |
5153
|
|
|
array( |
5154
|
|
|
'id_tree' => $inputData['folderId'], |
5155
|
|
|
'updated_at' => time(), |
5156
|
|
|
), |
5157
|
|
|
'id=%i', |
5158
|
|
|
$inputData['itemId'] |
5159
|
|
|
); |
5160
|
|
|
// --- |
5161
|
|
|
// --- |
5162
|
|
|
} elseif ((int) $dataSource['personal_folder'] === 0 && (int) $dataDestination['personal_folder'] === 1) { |
5163
|
|
|
// Source is public and destination is personal |
5164
|
|
|
// Decrypt and remove all sharekeys (items, fields, files) |
5165
|
|
|
// Encrypt only for the user |
5166
|
|
|
|
5167
|
|
|
// Remove all item sharekeys items |
5168
|
|
|
DB::delete( |
5169
|
|
|
prefixTable('sharekeys_items'), |
5170
|
|
|
'object_id = %i AND user_id != %i', |
5171
|
|
|
$inputData['itemId'], |
5172
|
|
|
$session->get('user-id') |
5173
|
|
|
); |
5174
|
|
|
|
5175
|
|
|
// Remove all item sharekeys fields |
5176
|
|
|
// Get fields for this Item |
5177
|
|
|
$rows = DB::query( |
5178
|
|
|
'SELECT id |
5179
|
|
|
FROM ' . prefixTable('categories_items') . ' |
5180
|
|
|
WHERE item_id = %i', |
5181
|
|
|
$inputData['itemId'] |
5182
|
|
|
); |
5183
|
|
|
foreach ($rows as $field) { |
5184
|
|
|
DB::delete( |
5185
|
|
|
prefixTable('sharekeys_fields'), |
5186
|
|
|
'object_id = %i AND user_id != %i', |
5187
|
|
|
$field['id'], |
5188
|
|
|
$session->get('user-id') |
5189
|
|
|
); |
5190
|
|
|
} |
5191
|
|
|
|
5192
|
|
|
// Remove all item sharekeys files |
5193
|
|
|
// Get FILES for this Item |
5194
|
|
|
$rows = DB::query( |
5195
|
|
|
'SELECT id |
5196
|
|
|
FROM ' . prefixTable('files') . ' |
5197
|
|
|
WHERE id_item = %i', |
5198
|
|
|
$inputData['itemId'] |
5199
|
|
|
); |
5200
|
|
|
foreach ($rows as $attachment) { |
5201
|
|
|
DB::delete( |
5202
|
|
|
prefixTable('sharekeys_files'), |
5203
|
|
|
'object_id = %i AND user_id != %i', |
5204
|
|
|
$attachment['id'], |
5205
|
|
|
$session->get('user-id') |
5206
|
|
|
); |
5207
|
|
|
} |
5208
|
|
|
|
5209
|
|
|
// update pw |
5210
|
|
|
DB::update( |
5211
|
|
|
prefixTable('items'), |
5212
|
|
|
array( |
5213
|
|
|
'id_tree' => $inputData['folderId'], |
5214
|
|
|
'perso' => 1, |
5215
|
|
|
'updated_at' => time(), |
5216
|
|
|
), |
5217
|
|
|
'id=%i', |
5218
|
|
|
$inputData['itemId'] |
5219
|
|
|
); |
5220
|
|
|
// --- |
5221
|
|
|
// --- |
5222
|
|
|
} elseif ((int) $dataSource['personal_folder'] === 1 && (int) $dataDestination['personal_folder'] === 1) { |
5223
|
|
|
// If previous is personal folder and new is personal folder too => no key exist on item |
5224
|
|
|
// just update is needed. Item key is the same |
5225
|
|
|
DB::update( |
5226
|
|
|
prefixTable('items'), |
5227
|
|
|
array( |
5228
|
|
|
'id_tree' => $inputData['folderId'], |
5229
|
|
|
'updated_at' => time(), |
5230
|
|
|
), |
5231
|
|
|
'id=%i', |
5232
|
|
|
$inputData['itemId'] |
5233
|
|
|
); |
5234
|
|
|
// --- |
5235
|
|
|
// --- |
5236
|
|
|
} elseif ((int) $dataSource['personal_folder'] === 1 && (int) $dataDestination['personal_folder'] === 0) { |
5237
|
|
|
// If previous is personal folder and new is not personal folder => no key exist on item => add new |
5238
|
|
|
// Create keys for all users |
5239
|
|
|
|
5240
|
|
|
// Get the ITEM object key for the user |
5241
|
|
|
$userKey = DB::queryFirstRow( |
5242
|
|
|
'SELECT share_key |
5243
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
5244
|
|
|
WHERE user_id = %i AND object_id = %i', |
5245
|
|
|
$session->get('user-id'), |
5246
|
|
|
$inputData['itemId'] |
5247
|
|
|
); |
5248
|
|
|
if (DB::count() > 0) { |
5249
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5250
|
|
|
|
5251
|
|
|
// This is a public object |
5252
|
|
|
$users = DB::query( |
5253
|
|
|
'SELECT id, public_key |
5254
|
|
|
FROM ' . prefixTable('users') . ' |
5255
|
|
|
WHERE id NOT IN %li |
5256
|
|
|
AND public_key != ""', |
5257
|
|
|
$tpUsersIDs |
5258
|
|
|
); |
5259
|
|
|
|
5260
|
|
|
foreach ($users as $user) { |
5261
|
|
|
// Insert in DB the new object key for this item by user |
5262
|
|
|
DB::insert( |
5263
|
|
|
prefixTable('sharekeys_items'), |
5264
|
|
|
array( |
5265
|
|
|
'object_id' => $inputData['itemId'], |
5266
|
|
|
'user_id' => (int) $user['id'], |
5267
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5268
|
|
|
) |
5269
|
|
|
); |
5270
|
|
|
} |
5271
|
|
|
} |
5272
|
|
|
|
5273
|
|
|
// Get the FIELDS object key for the user |
5274
|
|
|
// Get fields for this Item |
5275
|
|
|
$rows = DB::query( |
5276
|
|
|
'SELECT id |
5277
|
|
|
FROM ' . prefixTable('categories_items') . ' |
5278
|
|
|
WHERE item_id = %i', |
5279
|
|
|
$inputData['itemId'] |
5280
|
|
|
); |
5281
|
|
|
foreach ($rows as $field) { |
5282
|
|
|
$userKey = DB::queryFirstRow( |
5283
|
|
|
'SELECT share_key |
5284
|
|
|
FROM ' . prefixTable('sharekeys_fields') . ' |
5285
|
|
|
WHERE user_id = %i AND object_id = %i', |
5286
|
|
|
$session->get('user-id'), |
5287
|
|
|
$field['id'] |
5288
|
|
|
); |
5289
|
|
|
if (DB::count() > 0) { |
5290
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5291
|
|
|
|
5292
|
|
|
// This is a public object |
5293
|
|
|
$users = DB::query( |
5294
|
|
|
'SELECT id, public_key |
5295
|
|
|
FROM ' . prefixTable('users') . ' |
5296
|
|
|
WHERE id NOT IN %li |
5297
|
|
|
AND public_key != ""', |
5298
|
|
|
$tpUsersIDs |
5299
|
|
|
); |
5300
|
|
|
foreach ($users as $user) { |
5301
|
|
|
// Insert in DB the new object key for this item by user |
5302
|
|
|
DB::insert( |
5303
|
|
|
prefixTable('sharekeys_fields'), |
5304
|
|
|
array( |
5305
|
|
|
'object_id' => $field['id'], |
5306
|
|
|
'user_id' => (int) $user['id'], |
5307
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5308
|
|
|
) |
5309
|
|
|
); |
5310
|
|
|
} |
5311
|
|
|
} |
5312
|
|
|
} |
5313
|
|
|
|
5314
|
|
|
// Get the FILE object key for the user |
5315
|
|
|
// Get FILES for this Item |
5316
|
|
|
$rows = DB::query( |
5317
|
|
|
'SELECT id |
5318
|
|
|
FROM ' . prefixTable('files') . ' |
5319
|
|
|
WHERE id_item = %i', |
5320
|
|
|
$inputData['itemId'] |
5321
|
|
|
); |
5322
|
|
|
foreach ($rows as $attachment) { |
5323
|
|
|
$userKey = DB::queryFirstRow( |
5324
|
|
|
'SELECT share_key |
5325
|
|
|
FROM ' . prefixTable('sharekeys_files') . ' |
5326
|
|
|
WHERE user_id = %i AND object_id = %i', |
5327
|
|
|
$session->get('user-id'), |
5328
|
|
|
$attachment['id'] |
5329
|
|
|
); |
5330
|
|
|
if (DB::count() > 0) { |
5331
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5332
|
|
|
|
5333
|
|
|
// This is a public object |
5334
|
|
|
$users = DB::query( |
5335
|
|
|
'SELECT id, public_key |
5336
|
|
|
FROM ' . prefixTable('users') . ' |
5337
|
|
|
WHERE id NOT IN %li |
5338
|
|
|
AND public_key != ""', |
5339
|
|
|
$tpUsersIDs |
5340
|
|
|
); |
5341
|
|
|
|
5342
|
|
|
foreach ($users as $user) { |
5343
|
|
|
// Insert in DB the new object key for this item by user |
5344
|
|
|
DB::insert( |
5345
|
|
|
prefixTable('sharekeys_files'), |
5346
|
|
|
array( |
5347
|
|
|
'object_id' => $attachment['id'], |
5348
|
|
|
'user_id' => (int) $user['id'], |
5349
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5350
|
|
|
) |
5351
|
|
|
); |
5352
|
|
|
} |
5353
|
|
|
} |
5354
|
|
|
} |
5355
|
|
|
|
5356
|
|
|
// update item |
5357
|
|
|
DB::update( |
5358
|
|
|
prefixTable('items'), |
5359
|
|
|
array( |
5360
|
|
|
'id_tree' => $inputData['folderId'], |
5361
|
|
|
'perso' => 0, |
5362
|
|
|
'updated_at' => time(), |
5363
|
|
|
), |
5364
|
|
|
'id=%i', |
5365
|
|
|
$inputData['itemId'] |
5366
|
|
|
); |
5367
|
|
|
} |
5368
|
|
|
|
5369
|
|
|
// Log item moved |
5370
|
|
|
logItems( |
5371
|
|
|
$SETTINGS, |
5372
|
|
|
(int) $inputData['itemId'], |
5373
|
|
|
$dataSource['label'], |
5374
|
|
|
$session->get('user-id'), |
5375
|
|
|
'at_modification', |
5376
|
|
|
$session->get('user-login'), |
5377
|
|
|
'at_moved : ' . $dataSource['title'] . ' -> ' . $dataDestination['title'] |
5378
|
|
|
); |
5379
|
|
|
|
5380
|
|
|
// Update cache table |
5381
|
|
|
updateCacheTable('update_value', (int) $inputData['itemId']); |
5382
|
|
|
|
5383
|
|
|
$returnValues = array( |
5384
|
|
|
'error' => '', |
5385
|
|
|
'message' => '', |
5386
|
|
|
'from_folder' => $dataSource['id_tree'], |
5387
|
|
|
'to_folder' => $inputData['folderId'], |
5388
|
|
|
); |
5389
|
|
|
echo (string) prepareExchangedData( |
5390
|
|
|
$returnValues, |
5391
|
|
|
'encode' |
5392
|
|
|
); |
5393
|
|
|
break; |
5394
|
|
|
|
5395
|
|
|
/* |
5396
|
|
|
* CASE |
5397
|
|
|
* MASSIVE Move an ITEM |
5398
|
|
|
*/ |
5399
|
|
|
case 'mass_move_items': |
5400
|
|
|
// Check KEY and rights |
5401
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
5402
|
|
|
echo (string) prepareExchangedData( |
5403
|
|
|
array( |
5404
|
|
|
'error' => true, |
5405
|
|
|
'message' => $lang->get('key_is_not_correct'), |
5406
|
|
|
), |
5407
|
|
|
'encode' |
5408
|
|
|
); |
5409
|
|
|
break; |
5410
|
|
|
} |
5411
|
|
|
if ($session->get('user-read_only') === 1 || isset($SETTINGS['pwd_maximum_length']) === false) { |
5412
|
|
|
echo (string) prepareExchangedData( |
5413
|
|
|
array( |
5414
|
|
|
'error' => true, |
5415
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5416
|
|
|
), |
5417
|
|
|
'encode' |
5418
|
|
|
); |
5419
|
|
|
break; |
5420
|
|
|
} |
5421
|
|
|
|
5422
|
|
|
// decrypt and retreive data in JSON format |
5423
|
|
|
$dataReceived = prepareExchangedData( |
5424
|
|
|
$inputData['data'], |
5425
|
|
|
'decode' |
5426
|
|
|
); |
5427
|
|
|
$inputData['folderId'] = filter_var($dataReceived['folder_id'], FILTER_SANITIZE_NUMBER_INT); |
5428
|
|
|
$post_item_ids = filter_var($dataReceived['item_ids'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5429
|
|
|
|
5430
|
|
|
// loop on items to move |
5431
|
|
|
foreach (explode(';', $post_item_ids) as $item_id) { |
5432
|
|
|
if (empty($item_id) === false) { |
5433
|
|
|
// get data about item |
5434
|
|
|
$dataSource = DB::queryFirstRow( |
5435
|
|
|
'SELECT i.pw, f.personal_folder,i.id_tree, f.title,i.label |
5436
|
|
|
FROM ' . prefixTable('items') . ' as i |
5437
|
|
|
INNER JOIN ' . prefixTable('nested_tree') . ' as f ON (i.id_tree=f.id) |
5438
|
|
|
WHERE i.id=%i', |
5439
|
|
|
$item_id |
5440
|
|
|
); |
5441
|
|
|
|
5442
|
|
|
// Check that user can access this folder |
5443
|
|
|
if ( |
5444
|
|
|
in_array($dataSource['id_tree'], $session->get('user-accessible_folders')) === false |
5445
|
|
|
|| in_array($inputData['folderId'], $session->get('user-accessible_folders')) === false |
5446
|
|
|
) { |
5447
|
|
|
echo (string) prepareExchangedData( |
5448
|
|
|
array( |
5449
|
|
|
'error' => true, |
5450
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5451
|
|
|
), |
5452
|
|
|
'encode' |
5453
|
|
|
); |
5454
|
|
|
exit; |
5455
|
|
|
} |
5456
|
|
|
|
5457
|
|
|
// get data about new folder |
5458
|
|
|
$dataDestination = DB::queryFirstRow( |
5459
|
|
|
'SELECT personal_folder, title FROM ' . prefixTable('nested_tree') . ' WHERE id = %i', |
5460
|
|
|
$inputData['folderId'] |
5461
|
|
|
); |
5462
|
|
|
|
5463
|
|
|
// previous is non personal folder and new too |
5464
|
|
|
if ( |
5465
|
|
|
(int) $dataSource['personal_folder'] === 0 |
5466
|
|
|
&& (int) $dataDestination['personal_folder'] === 0 |
5467
|
|
|
) { |
5468
|
|
|
// just update is needed. Item key is the same |
5469
|
|
|
DB::update( |
5470
|
|
|
prefixTable('items'), |
5471
|
|
|
array( |
5472
|
|
|
'id_tree' => $inputData['folderId'], |
5473
|
|
|
'updated_at' => time(), |
5474
|
|
|
), |
5475
|
|
|
'id = %i', |
5476
|
|
|
$item_id |
5477
|
|
|
); |
5478
|
|
|
// --- |
5479
|
|
|
// --- |
5480
|
|
|
// --- |
5481
|
|
|
} elseif ( |
5482
|
|
|
(int) $dataSource['personal_folder'] === 0 |
5483
|
|
|
&& (int) $dataDestination['personal_folder'] === 1 |
5484
|
|
|
) { |
5485
|
|
|
// Source is public and destination is personal |
5486
|
|
|
// Decrypt and remove all sharekeys (items, fields, files) |
5487
|
|
|
// Encrypt only for the user |
5488
|
|
|
|
5489
|
|
|
// Remove all item sharekeys items |
5490
|
|
|
DB::delete( |
5491
|
|
|
prefixTable('sharekeys_items'), |
5492
|
|
|
'object_id = %i AND user_id != %i', |
5493
|
|
|
$item_id, |
5494
|
|
|
$session->get('user-id') |
5495
|
|
|
); |
5496
|
|
|
|
5497
|
|
|
// Remove all item sharekeys fields |
5498
|
|
|
// Get fields for this Item |
5499
|
|
|
$rows = DB::query( |
5500
|
|
|
'SELECT id |
5501
|
|
|
FROM ' . prefixTable('categories_items') . ' |
5502
|
|
|
WHERE item_id = %i', |
5503
|
|
|
$item_id |
5504
|
|
|
); |
5505
|
|
|
foreach ($rows as $field) { |
5506
|
|
|
DB::delete( |
5507
|
|
|
prefixTable('sharekeys_fields'), |
5508
|
|
|
'object_id = %i AND user_id != %i', |
5509
|
|
|
$field['id'], |
5510
|
|
|
$session->get('user-id') |
5511
|
|
|
); |
5512
|
|
|
} |
5513
|
|
|
|
5514
|
|
|
// Remove all item sharekeys files |
5515
|
|
|
// Get FILES for this Item |
5516
|
|
|
$rows = DB::query( |
5517
|
|
|
'SELECT id |
5518
|
|
|
FROM ' . prefixTable('files') . ' |
5519
|
|
|
WHERE id_item = %i', |
5520
|
|
|
$item_id |
5521
|
|
|
); |
5522
|
|
|
foreach ($rows as $attachment) { |
5523
|
|
|
DB::delete( |
5524
|
|
|
prefixTable('sharekeys_files'), |
5525
|
|
|
'object_id = %i AND user_id != %i', |
5526
|
|
|
$attachment['id'], |
5527
|
|
|
$session->get('user-id') |
5528
|
|
|
); |
5529
|
|
|
} |
5530
|
|
|
|
5531
|
|
|
// update pw |
5532
|
|
|
DB::update( |
5533
|
|
|
prefixTable('items'), |
5534
|
|
|
array( |
5535
|
|
|
'id_tree' => $inputData['folderId'], |
5536
|
|
|
'perso' => 1, |
5537
|
|
|
'updated_at' => time(), |
5538
|
|
|
), |
5539
|
|
|
'id = %i', |
5540
|
|
|
$item_id |
5541
|
|
|
); |
5542
|
|
|
// --- |
5543
|
|
|
// --- |
5544
|
|
|
// --- |
5545
|
|
|
} elseif ( |
5546
|
|
|
(int) $dataSource['personal_folder'] === 1 |
5547
|
|
|
&& (int) $dataDestination['personal_folder'] === 1 |
5548
|
|
|
) { |
5549
|
|
|
// If previous is personal folder and new is personal folder too => no key exist on item |
5550
|
|
|
// just update is needed. Item key is the same |
5551
|
|
|
DB::update( |
5552
|
|
|
prefixTable('items'), |
5553
|
|
|
array( |
5554
|
|
|
'id_tree' => $inputData['folderId'], |
5555
|
|
|
'updated_at' => time(), |
5556
|
|
|
), |
5557
|
|
|
'id = %i', |
5558
|
|
|
$item_id |
5559
|
|
|
); |
5560
|
|
|
// --- |
5561
|
|
|
// --- |
5562
|
|
|
// --- |
5563
|
|
|
} elseif ( |
5564
|
|
|
(int) $dataSource['personal_folder'] === 1 |
5565
|
|
|
&& (int) $dataDestination['personal_folder'] === 0 |
5566
|
|
|
) { |
5567
|
|
|
// If previous is personal folder and new is not personal folder => no key exist on item => add new |
5568
|
|
|
// Create keys for all users |
5569
|
|
|
|
5570
|
|
|
// Get the ITEM object key for the user |
5571
|
|
|
$userKey = DB::queryFirstRow( |
5572
|
|
|
'SELECT share_key |
5573
|
|
|
FROM ' . prefixTable('sharekeys_items') . ' |
5574
|
|
|
WHERE user_id = %i AND object_id = %i', |
5575
|
|
|
$session->get('user-id'), |
5576
|
|
|
$item_id |
5577
|
|
|
); |
5578
|
|
|
if (DB::count() > 0) { |
5579
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5580
|
|
|
|
5581
|
|
|
// This is a public object |
5582
|
|
|
$users = DB::query( |
5583
|
|
|
'SELECT id, public_key |
5584
|
|
|
FROM ' . prefixTable('users') . ' |
5585
|
|
|
WHERE id NOT IN %li |
5586
|
|
|
AND public_key != ""', |
5587
|
|
|
$tpUsersIDs |
5588
|
|
|
); |
5589
|
|
|
|
5590
|
|
|
foreach ($users as $user) { |
5591
|
|
|
// Insert in DB the new object key for this item by user |
5592
|
|
|
DB::insert( |
5593
|
|
|
prefixTable('sharekeys_items'), |
5594
|
|
|
array( |
5595
|
|
|
'object_id' => $item_id, |
5596
|
|
|
'user_id' => (int) $user['id'], |
5597
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5598
|
|
|
) |
5599
|
|
|
); |
5600
|
|
|
} |
5601
|
|
|
} |
5602
|
|
|
|
5603
|
|
|
// Get the FIELDS object key for the user |
5604
|
|
|
// Get fields for this Item |
5605
|
|
|
$rows = DB::query( |
5606
|
|
|
'SELECT id |
5607
|
|
|
FROM ' . prefixTable('categories_items') . ' |
5608
|
|
|
WHERE item_id = %i', |
5609
|
|
|
$item_id |
5610
|
|
|
); |
5611
|
|
|
foreach ($rows as $field) { |
5612
|
|
|
$userKey = DB::queryFirstRow( |
5613
|
|
|
'SELECT share_key |
5614
|
|
|
FROM ' . prefixTable('sharekeys_fields') . ' |
5615
|
|
|
WHERE user_id = %i AND object_id = %i', |
5616
|
|
|
$session->get('user-id'), |
5617
|
|
|
$field['id'] |
5618
|
|
|
); |
5619
|
|
|
if (DB::count() > 0) { |
5620
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5621
|
|
|
|
5622
|
|
|
// This is a public object |
5623
|
|
|
$users = DB::query( |
5624
|
|
|
'SELECT id, public_key |
5625
|
|
|
FROM ' . prefixTable('users') . ' |
5626
|
|
|
WHERE id NOT IN %li |
5627
|
|
|
AND public_key != ""', |
5628
|
|
|
$tpUsersIDs |
5629
|
|
|
); |
5630
|
|
|
|
5631
|
|
|
foreach ($users as $user) { |
5632
|
|
|
// Insert in DB the new object key for this item by user |
5633
|
|
|
DB::insert( |
5634
|
|
|
prefixTable('sharekeys_fields'), |
5635
|
|
|
array( |
5636
|
|
|
'object_id' => $field['id'], |
5637
|
|
|
'user_id' => (int) $user['id'], |
5638
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5639
|
|
|
) |
5640
|
|
|
); |
5641
|
|
|
} |
5642
|
|
|
} |
5643
|
|
|
} |
5644
|
|
|
|
5645
|
|
|
// Get the FILE object key for the user |
5646
|
|
|
// Get FILES for this Item |
5647
|
|
|
$rows = DB::query( |
5648
|
|
|
'SELECT id |
5649
|
|
|
FROM ' . prefixTable('files') . ' |
5650
|
|
|
WHERE id_item = %i', |
5651
|
|
|
$item_id |
5652
|
|
|
); |
5653
|
|
|
foreach ($rows as $attachment) { |
5654
|
|
|
$userKey = DB::queryFirstRow( |
5655
|
|
|
'SELECT share_key |
5656
|
|
|
FROM ' . prefixTable('sharekeys_files') . ' |
5657
|
|
|
WHERE user_id = %i AND object_id = %i', |
5658
|
|
|
$session->get('user-id'), |
5659
|
|
|
$attachment['id'] |
5660
|
|
|
); |
5661
|
|
|
if (DB::count() > 0) { |
5662
|
|
|
$objectKey = decryptUserObjectKey($userKey['share_key'], $session->get('user-private_key')); |
5663
|
|
|
|
5664
|
|
|
// This is a public object |
5665
|
|
|
$users = DB::query( |
5666
|
|
|
'SELECT id, public_key |
5667
|
|
|
FROM ' . prefixTable('users') . ' |
5668
|
|
|
WHERE id NOT IN %li |
5669
|
|
|
AND public_key != ""', |
5670
|
|
|
$tpUsersIDs |
5671
|
|
|
); |
5672
|
|
|
|
5673
|
|
|
foreach ($users as $user) { |
5674
|
|
|
// Insert in DB the new object key for this item by user |
5675
|
|
|
DB::insert( |
5676
|
|
|
prefixTable('sharekeys_files'), |
5677
|
|
|
array( |
5678
|
|
|
'object_id' => $attachment['id'], |
5679
|
|
|
'user_id' => (int) $user['id'], |
5680
|
|
|
'share_key' => encryptUserObjectKey($objectKey, $user['public_key']), |
5681
|
|
|
) |
5682
|
|
|
); |
5683
|
|
|
} |
5684
|
|
|
} |
5685
|
|
|
} |
5686
|
|
|
|
5687
|
|
|
// update item |
5688
|
|
|
DB::update( |
5689
|
|
|
prefixTable('items'), |
5690
|
|
|
array( |
5691
|
|
|
'id_tree' => $inputData['folderId'], |
5692
|
|
|
'perso' => 0, |
5693
|
|
|
'updated_at' => time(), |
5694
|
|
|
), |
5695
|
|
|
'id=%i', |
5696
|
|
|
$item_id |
5697
|
|
|
); |
5698
|
|
|
} |
5699
|
|
|
// Log item moved |
5700
|
|
|
logItems( |
5701
|
|
|
$SETTINGS, |
5702
|
|
|
(int) $item_id, |
5703
|
|
|
$dataSource['label'], |
5704
|
|
|
$session->get('user-id'), |
5705
|
|
|
'at_modification', |
5706
|
|
|
$session->get('user-login'), |
5707
|
|
|
'at_moved : ' . $dataSource['title'] . ' -> ' . $dataDestination['title'] |
5708
|
|
|
); |
5709
|
|
|
} |
5710
|
|
|
} |
5711
|
|
|
|
5712
|
|
|
// reload cache table |
5713
|
|
|
require_once $SETTINGS['cpassman_dir'] . '/sources/main.functions.php'; |
5714
|
|
|
updateCacheTable('reload', null); |
5715
|
|
|
|
5716
|
|
|
echo (string) prepareExchangedData( |
5717
|
|
|
array( |
5718
|
|
|
'error' => false, |
5719
|
|
|
'message' => '', |
5720
|
|
|
), |
5721
|
|
|
'encode' |
5722
|
|
|
); |
5723
|
|
|
break; |
5724
|
|
|
|
5725
|
|
|
/* |
5726
|
|
|
* CASE |
5727
|
|
|
* MASSIVE Delete an item |
5728
|
|
|
*/ |
5729
|
|
|
case 'mass_delete_items': |
5730
|
|
|
// Check KEY and rights |
5731
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
5732
|
|
|
echo (string) prepareExchangedData( |
5733
|
|
|
array( |
5734
|
|
|
'error' => true, |
5735
|
|
|
'message' => $lang->get('key_is_not_correct'), |
5736
|
|
|
), |
5737
|
|
|
'encode' |
5738
|
|
|
); |
5739
|
|
|
break; |
5740
|
|
|
} |
5741
|
|
|
if ($session->get('user-read_only') === 1) { |
5742
|
|
|
echo (string) prepareExchangedData( |
5743
|
|
|
array( |
5744
|
|
|
'error' => true, |
5745
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5746
|
|
|
), |
5747
|
|
|
'encode' |
5748
|
|
|
); |
5749
|
|
|
break; |
5750
|
|
|
} |
5751
|
|
|
|
5752
|
|
|
// decrypt and retreive data in JSON format |
5753
|
|
|
$dataReceived = prepareExchangedData( |
5754
|
|
|
$inputData['data'], |
5755
|
|
|
'decode' |
5756
|
|
|
); |
5757
|
|
|
$post_item_ids = filter_var($dataReceived['item_ids'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5758
|
|
|
|
5759
|
|
|
// perform a check in case of Read-Only user creating an item in his PF |
5760
|
|
|
if ($session->get('user-read_only') === 1) { |
5761
|
|
|
echo (string) prepareExchangedData( |
5762
|
|
|
array( |
5763
|
|
|
'error' => true, |
5764
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5765
|
|
|
), |
5766
|
|
|
'encode' |
5767
|
|
|
); |
5768
|
|
|
break; |
5769
|
|
|
} |
5770
|
|
|
|
5771
|
|
|
// loop on items to move |
5772
|
|
|
foreach (explode(';', $post_item_ids) as $item_id) { |
5773
|
|
|
if (empty($item_id) === false) { |
5774
|
|
|
// get info |
5775
|
|
|
$dataSource = DB::queryFirstRow( |
5776
|
|
|
'SELECT label, id_tree |
5777
|
|
|
FROM ' . prefixTable('items') . ' |
5778
|
|
|
WHERE id=%i', |
5779
|
|
|
$item_id |
5780
|
|
|
); |
5781
|
|
|
|
5782
|
|
|
// Check that user can access this folder |
5783
|
|
|
if ( |
5784
|
|
|
in_array($dataSource['id_tree'], $session->get('user-accessible_folders')) === false |
5785
|
|
|
) { |
5786
|
|
|
echo (string) prepareExchangedData( |
5787
|
|
|
array( |
5788
|
|
|
'error' => true, |
5789
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5790
|
|
|
), |
5791
|
|
|
'encode' |
5792
|
|
|
); |
5793
|
|
|
break; |
5794
|
|
|
} |
5795
|
|
|
|
5796
|
|
|
// delete item consists in disabling it |
5797
|
|
|
DB::update( |
5798
|
|
|
prefixTable('items'), |
5799
|
|
|
array( |
5800
|
|
|
'inactif' => '1', |
5801
|
|
|
'deleted_at' => time(), |
5802
|
|
|
), |
5803
|
|
|
'id = %i', |
5804
|
|
|
$item_id |
5805
|
|
|
); |
5806
|
|
|
|
5807
|
|
|
// log |
5808
|
|
|
logItems( |
5809
|
|
|
$SETTINGS, |
5810
|
|
|
(int) $item_id, |
5811
|
|
|
$dataSource['label'], |
5812
|
|
|
$session->get('user-id'), |
5813
|
|
|
'at_delete', |
5814
|
|
|
$session->get('user-login') |
5815
|
|
|
); |
5816
|
|
|
|
5817
|
|
|
// Update CACHE table |
5818
|
|
|
updateCacheTable('delete_value', (int) $item_id); |
5819
|
|
|
} |
5820
|
|
|
} |
5821
|
|
|
|
5822
|
|
|
echo (string) prepareExchangedData( |
5823
|
|
|
array( |
5824
|
|
|
'error' => false, |
5825
|
|
|
'message' => '', |
5826
|
|
|
), |
5827
|
|
|
'encode' |
5828
|
|
|
); |
5829
|
|
|
break; |
5830
|
|
|
|
5831
|
|
|
/* |
5832
|
|
|
* CASE |
5833
|
|
|
* Send email |
5834
|
|
|
*/ |
5835
|
|
|
case 'send_email': |
5836
|
|
|
// Check KEY |
5837
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
5838
|
|
|
echo (string) prepareExchangedData( |
5839
|
|
|
array( |
5840
|
|
|
'error' => true, |
5841
|
|
|
'message' => $lang->get('key_is_not_correct'), |
5842
|
|
|
), |
5843
|
|
|
'encode' |
5844
|
|
|
); |
5845
|
|
|
break; |
5846
|
|
|
} |
5847
|
|
|
if ($session->get('user-read_only') === 1) { |
5848
|
|
|
echo (string) prepareExchangedData( |
5849
|
|
|
array( |
5850
|
|
|
'error' => true, |
5851
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
5852
|
|
|
), |
5853
|
|
|
'encode' |
5854
|
|
|
); |
5855
|
|
|
break; |
5856
|
|
|
} |
5857
|
|
|
|
5858
|
|
|
// decrypt and retrieve data in JSON format |
5859
|
|
|
$dataReceived = prepareExchangedData( |
5860
|
|
|
$inputData['data'], |
5861
|
|
|
'decode' |
5862
|
|
|
); |
5863
|
|
|
|
5864
|
|
|
// Prepare variables |
5865
|
|
|
$inputData['id'] = filter_var($dataReceived['id'], FILTER_SANITIZE_NUMBER_INT); |
5866
|
|
|
$inputData['receipt'] = filter_var($dataReceived['receipt'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5867
|
|
|
$inputData['cat'] = filter_var($dataReceived['cat'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5868
|
|
|
$post_content = $request->request->has('name') ? explode(',', $request->request->filter('content', '', FILTER_SANITIZE_FULL_SPECIAL_CHARS)) : ''; |
5869
|
|
|
|
5870
|
|
|
// get links url |
5871
|
|
|
if (empty($SETTINGS['email_server_url']) === true) { |
5872
|
|
|
$SETTINGS['email_server_url'] = $SETTINGS['cpassman_url']; |
5873
|
|
|
} |
5874
|
|
|
if ($inputData['cat'] === 'request_access_to_author') { |
5875
|
|
|
// Variables |
5876
|
|
|
$dataAuthor = DB::queryFirstRow( |
5877
|
|
|
'SELECT email,login |
5878
|
|
|
FROM ' . prefixTable('users') . ' |
5879
|
|
|
WHERE id = %i', |
5880
|
|
|
$post_content[1] |
5881
|
|
|
); |
5882
|
|
|
|
5883
|
|
|
$dataItem = DB::queryFirstRow( |
5884
|
|
|
'SELECT label, id_tree |
5885
|
|
|
FROM ' . prefixTable('items') . ' |
5886
|
|
|
WHERE id = %i', |
5887
|
|
|
$post_content[0] |
5888
|
|
|
); |
5889
|
|
|
|
5890
|
|
|
// Get path |
5891
|
|
|
$path = geItemReadablePath( |
5892
|
|
|
(int) $dataItem['id_tree'], |
5893
|
|
|
$dataItem['label'], |
5894
|
|
|
$SETTINGS |
5895
|
|
|
); |
5896
|
|
|
|
5897
|
|
|
// Prepare email |
5898
|
|
|
prepareSendingEmail( |
5899
|
|
|
$lang->get('email_request_access_subject'), |
5900
|
|
|
str_replace( |
5901
|
|
|
array('#tp_item_author#', '#tp_user#', '#tp_item#'), |
5902
|
|
|
array(' ' . addslashes($dataAuthor['login']), addslashes($session->get('user-login')), $path), |
5903
|
|
|
$lang->get('email_request_access_mail') |
5904
|
|
|
), |
5905
|
|
|
$dataAuthor['email'], |
5906
|
|
|
"" |
5907
|
|
|
); |
5908
|
|
|
} elseif ($inputData['cat'] === 'share_this_item') { |
5909
|
|
|
$dataItem = DB::queryFirstRow( |
5910
|
|
|
'SELECT label,id_tree |
5911
|
|
|
FROM ' . prefixTable('items') . ' |
5912
|
|
|
WHERE id= %i', |
5913
|
|
|
$inputData['id'] |
5914
|
|
|
); |
5915
|
|
|
|
5916
|
|
|
// Get path |
5917
|
|
|
$path = geItemReadablePath( |
5918
|
|
|
(int) $dataItem['id_tree'], |
5919
|
|
|
$dataItem['label'], |
5920
|
|
|
$SETTINGS |
5921
|
|
|
); |
5922
|
|
|
|
5923
|
|
|
// Prepare email |
5924
|
|
|
prepareSendingEmail( |
5925
|
|
|
$lang->get('email_share_item_subject'), |
5926
|
|
|
str_replace( |
5927
|
|
|
array( |
5928
|
|
|
'#tp_link#', |
5929
|
|
|
'#tp_user#', |
5930
|
|
|
'#tp_item#', |
5931
|
|
|
), |
5932
|
|
|
array( |
5933
|
|
|
empty($SETTINGS['email_server_url']) === false ? |
5934
|
|
|
$SETTINGS['email_server_url'] . '/index.php?page=items&group=' . $dataItem['id_tree'] . '&id=' . $inputData['id'] : $SETTINGS['cpassman_url'] . '/index.php?page=items&group=' . $dataItem['id_tree'] . '&id=' . $inputData['id'], |
5935
|
|
|
addslashes($session->get('user-login')), |
5936
|
|
|
addslashes($path), |
5937
|
|
|
), |
5938
|
|
|
$lang->get('email_share_item_mail') |
5939
|
|
|
), |
5940
|
|
|
$inputData['receipt'], |
5941
|
|
|
"" |
5942
|
|
|
); |
5943
|
|
|
} |
5944
|
|
|
|
5945
|
|
|
echo (string) prepareExchangedData( |
5946
|
|
|
array( |
5947
|
|
|
'error' => false, |
5948
|
|
|
'message' => '', |
5949
|
|
|
), |
5950
|
|
|
'encode' |
5951
|
|
|
); |
5952
|
|
|
break; |
5953
|
|
|
|
5954
|
|
|
/* |
5955
|
|
|
* CASE |
5956
|
|
|
* Item History Log - add new entry |
5957
|
|
|
*/ |
5958
|
|
|
case 'history_entry_add': |
5959
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
5960
|
|
|
$data = array('error' => 'key_is_wrong'); |
5961
|
|
|
echo (string) prepareExchangedData( |
5962
|
|
|
$data, |
5963
|
|
|
'encode' |
5964
|
|
|
); |
5965
|
|
|
break; |
5966
|
|
|
} |
5967
|
|
|
|
5968
|
|
|
// decrypt and retreive data in JSON format |
5969
|
|
|
$dataReceived = prepareExchangedData( |
5970
|
|
|
$inputData['data'], |
5971
|
|
|
'decode' |
5972
|
|
|
); |
5973
|
|
|
|
5974
|
|
|
$item_id = filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
5975
|
|
|
$label = filter_var($dataReceived['label'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5976
|
|
|
$date = filter_var($dataReceived['date'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5977
|
|
|
$time = filter_var($dataReceived['time'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
5978
|
|
|
$session__user_list_folders_limited = $session->get('user-list_folders_limited'); |
5979
|
|
|
|
5980
|
|
|
// Get all informations for this item |
5981
|
|
|
$dataItem = DB::queryFirstRow( |
5982
|
|
|
'SELECT * |
5983
|
|
|
FROM ' . prefixTable('items') . ' as i |
5984
|
|
|
INNER JOIN ' . prefixTable('log_items') . ' as l ON (l.id_item = i.id) |
5985
|
|
|
WHERE i.id=%i AND l.action = %s', |
5986
|
|
|
$item_id, |
5987
|
|
|
'at_creation' |
5988
|
|
|
); |
5989
|
|
|
// check that actual user can access this item |
5990
|
|
|
$restrictionActive = true; |
5991
|
|
|
$restrictedTo = is_null($dataItem['restricted_to']) === false ? array_filter(explode(';', $dataItem['restricted_to'])) : []; |
5992
|
|
|
if (in_array($session->get('user-id'), $restrictedTo)) { |
5993
|
|
|
$restrictionActive = false; |
5994
|
|
|
} |
5995
|
|
|
if (empty($dataItem['restricted_to'])) { |
5996
|
|
|
$restrictionActive = false; |
5997
|
|
|
} |
5998
|
|
|
|
5999
|
|
|
if (((in_array($dataItem['id_tree'], $session->get('user-accessible_folders'))) && ((int) $dataItem['perso'] === 0 || ((int) $dataItem['perso'] === 1 && $dataItem['id_user'] === $session->get('user-id'))) && $restrictionActive === false) |
6000
|
|
|
|| (isset($SETTINGS['anyone_can_modify']) && (int) $SETTINGS['anyone_can_modify'] === 1 && (int) $dataItem['anyone_can_modify'] === 1 && (in_array($dataItem['id_tree'], $session->get('user-accessible_folders')) || (int) $session->get('user-admin') === 1) && $restrictionActive === false) |
6001
|
|
|
|| (is_array($session__user_list_folders_limited[$inputData['folderId']]) === true && in_array($inputData['id'], $session__user_list_folders_limited[$inputData['folderId']]) === true) |
6002
|
|
|
) { |
6003
|
|
|
// Query |
6004
|
|
|
logItems( |
6005
|
|
|
$SETTINGS, |
6006
|
|
|
(int) $item_id, |
6007
|
|
|
$dataItem['label'], |
6008
|
|
|
$session->get('user-id'), |
6009
|
|
|
'at_manual', |
6010
|
|
|
$session->get('user-login'), |
6011
|
|
|
htmlspecialchars_decode($label, ENT_QUOTES), |
6012
|
|
|
null, |
6013
|
|
|
(string) dateToStamp($date.' '.$time, $SETTINGS['date_format'] . ' ' . $SETTINGS['time_format']) |
6014
|
|
|
); |
6015
|
|
|
// Prepare new line |
6016
|
|
|
$data = DB::queryFirstRow( |
6017
|
|
|
'SELECT * FROM ' . prefixTable('log_items') . ' WHERE id_item = %i ORDER BY date DESC', |
6018
|
|
|
$item_id |
6019
|
|
|
); |
6020
|
|
|
$historic = date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $data['date']) . ' - ' . $session->get('user-login') . ' - ' . $lang->get($data['action']) . ' - ' . $data['raison']; |
6021
|
|
|
// send back |
6022
|
|
|
$data = array( |
6023
|
|
|
'error' => '', |
6024
|
|
|
'new_line' => '<br>' . addslashes($historic), |
6025
|
|
|
); |
6026
|
|
|
echo (string) prepareExchangedData( |
6027
|
|
|
$data, |
6028
|
|
|
'encode' |
6029
|
|
|
); |
6030
|
|
|
} else { |
6031
|
|
|
$data = array('error' => 'something_wrong'); |
6032
|
|
|
echo (string) prepareExchangedData( |
6033
|
|
|
$data, |
6034
|
|
|
'encode' |
6035
|
|
|
); |
6036
|
|
|
break; |
6037
|
|
|
} |
6038
|
|
|
break; |
6039
|
|
|
|
6040
|
|
|
/* |
6041
|
|
|
* CASE |
6042
|
|
|
* Free Item for Edition |
6043
|
|
|
*/ |
6044
|
|
|
case 'free_item_for_edition': |
6045
|
|
|
// Check KEY |
6046
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6047
|
|
|
echo '[ { "error" : "key_not_conform" } ]'; |
6048
|
|
|
break; |
6049
|
|
|
} |
6050
|
|
|
// Do |
6051
|
|
|
DB::delete( |
6052
|
|
|
prefixTable('items_edition'), |
6053
|
|
|
'item_id = %i', |
6054
|
|
|
$inputData['id'] |
6055
|
|
|
); |
6056
|
|
|
break; |
6057
|
|
|
|
6058
|
|
|
/* |
6059
|
|
|
* CASE |
6060
|
|
|
* Check if Item has been changed since loaded |
6061
|
|
|
*/ |
6062
|
|
|
case 'generate_OTV_url': |
6063
|
|
|
// Check KEY |
6064
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6065
|
|
|
echo '[ { "error" : "key_not_conform" } ]'; |
6066
|
|
|
break; |
6067
|
|
|
} |
6068
|
|
|
|
6069
|
|
|
// decrypt and retreive data in JSON format |
6070
|
|
|
$dataReceived = prepareExchangedData( |
6071
|
|
|
$inputData['data'], |
6072
|
|
|
'decode' |
6073
|
|
|
); |
6074
|
|
|
|
6075
|
|
|
// delete all existing old otv codes |
6076
|
|
|
DB::delete( |
6077
|
|
|
prefixTable('otv'), |
6078
|
|
|
'time_limit < %i', |
6079
|
|
|
time() |
6080
|
|
|
); |
6081
|
|
|
|
6082
|
|
|
// generate session |
6083
|
|
|
$otv_code = GenerateCryptKey(32, false, true, true, false, true); |
6084
|
|
|
$otv_key = GenerateCryptKey(32, false, true, true, false, true); |
6085
|
|
|
|
6086
|
|
|
// Generate Defuse key |
6087
|
|
|
$otv_user_code_encrypted = defuse_generate_personal_key($otv_key); |
6088
|
|
|
|
6089
|
|
|
// check if psk is correct. |
6090
|
|
|
$otv_key_encoded = defuse_validate_personal_key( |
6091
|
|
|
$otv_key, |
6092
|
|
|
$otv_user_code_encrypted |
6093
|
|
|
); |
6094
|
|
|
|
6095
|
|
|
// Decrypt the pwd |
6096
|
|
|
// Should we log a password change? |
6097
|
|
|
$itemQ = DB::queryFirstRow( |
6098
|
|
|
'SELECT s.share_key, i.pw |
6099
|
|
|
FROM ' . prefixTable('items') . ' AS i |
6100
|
|
|
INNER JOIN ' . prefixTable('sharekeys_items') . ' AS s ON (i.id = s.object_id) |
6101
|
|
|
WHERE s.user_id = %i AND s.object_id = %i', |
6102
|
|
|
$session->get('user-id'), |
6103
|
|
|
$dataReceived['id'] |
6104
|
|
|
); |
6105
|
|
|
if (DB::count() === 0 || empty($itemQ['pw']) === true) { |
6106
|
|
|
// No share key found |
6107
|
|
|
$pw = ''; |
6108
|
|
|
} else { |
6109
|
|
|
$pw = base64_decode(doDataDecryption( |
6110
|
|
|
$itemQ['pw'], |
6111
|
|
|
decryptUserObjectKey( |
6112
|
|
|
$itemQ['share_key'], |
6113
|
|
|
$session->get('user-private_key') |
6114
|
|
|
) |
6115
|
|
|
)); |
6116
|
|
|
} |
6117
|
|
|
|
6118
|
|
|
// Encrypt it with DEFUSE using the generated code as key |
6119
|
|
|
// This is required as the OTV is used by someone without any Teampass account |
6120
|
|
|
$passwd = cryption( |
6121
|
|
|
$pw, |
6122
|
|
|
$otv_key_encoded, |
6123
|
|
|
'encrypt', |
6124
|
|
|
$SETTINGS |
6125
|
|
|
); |
6126
|
|
|
$timestampReference = time(); |
6127
|
|
|
|
6128
|
|
|
DB::insert( |
6129
|
|
|
prefixTable('otv'), |
6130
|
|
|
array( |
6131
|
|
|
'id' => null, |
6132
|
|
|
'item_id' => $dataReceived['id'], |
6133
|
|
|
'timestamp' => $timestampReference, |
6134
|
|
|
'originator' => intval($session->get('user-id')), |
6135
|
|
|
'code' => $otv_code, |
6136
|
|
|
'encrypted' => $passwd['string'], |
6137
|
|
|
'time_limit' => (int) $dataReceived['days'] * (int) TP_ONE_DAY_SECONDS + time(), |
6138
|
|
|
'max_views' => (int) $dataReceived['views'], |
6139
|
|
|
'shared_globaly' => 0, |
6140
|
|
|
) |
6141
|
|
|
); |
6142
|
|
|
$newID = DB::insertId(); |
6143
|
|
|
|
6144
|
|
|
// Prepare URL content |
6145
|
|
|
$otv_session = array( |
6146
|
|
|
'otv' => true, |
6147
|
|
|
'code' => $otv_code, |
6148
|
|
|
'key' => $otv_key_encoded, |
6149
|
|
|
'stamp' => $timestampReference, |
6150
|
|
|
); |
6151
|
|
|
|
6152
|
|
|
if (isset($SETTINGS['otv_expiration_period']) === false) { |
6153
|
|
|
$SETTINGS['otv_expiration_period'] = 7; |
6154
|
|
|
} |
6155
|
|
|
$url = $SETTINGS['cpassman_url'] . '/index.php?' . http_build_query($otv_session); |
6156
|
|
|
|
6157
|
|
|
echo json_encode( |
6158
|
|
|
array( |
6159
|
|
|
'error' => '', |
6160
|
|
|
'url' => $url, |
6161
|
|
|
'otv_id' => $newID, |
6162
|
|
|
) |
6163
|
|
|
); |
6164
|
|
|
break; |
6165
|
|
|
|
6166
|
|
|
/* |
6167
|
|
|
* CASE |
6168
|
|
|
* Check if Item has been changed since loaded |
6169
|
|
|
*/ |
6170
|
|
|
case 'update_OTV_url': |
6171
|
|
|
// Check KEY |
6172
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6173
|
|
|
echo '[ { "error" : "key_not_conform" } ]'; |
6174
|
|
|
break; |
6175
|
|
|
} |
6176
|
|
|
|
6177
|
|
|
// decrypt and retreive data in JSON format |
6178
|
|
|
$dataReceived = prepareExchangedData( |
6179
|
|
|
$inputData['data'], |
6180
|
|
|
'decode' |
6181
|
|
|
); |
6182
|
|
|
|
6183
|
|
|
// get parameters from original link |
6184
|
|
|
$url = $dataReceived['original_link']; |
6185
|
|
|
$parts = parse_url($url); |
6186
|
|
|
if(isset($parts['query'])){ |
6187
|
|
|
parse_str($parts['query'], $orignal_link_parameters); |
6188
|
|
|
} else { |
6189
|
|
|
$orignal_link_parameters = array(); |
6190
|
|
|
} |
6191
|
|
|
|
6192
|
|
|
// update database |
6193
|
|
|
DB::update( |
6194
|
|
|
prefixTable('otv'), |
6195
|
|
|
array( |
6196
|
|
|
'time_limit' => (int) $dataReceived['days'] * (int) TP_ONE_DAY_SECONDS + time(), |
6197
|
|
|
'max_views' => (int) $dataReceived['views'], |
6198
|
|
|
'shared_globaly' => (int) $dataReceived['shared_globaly'] === 1 ? 1 : 0, |
6199
|
|
|
), |
6200
|
|
|
'id = %i', |
6201
|
|
|
$dataReceived['otv_id'] |
6202
|
|
|
); |
6203
|
|
|
|
6204
|
|
|
// Prepare URL content |
6205
|
|
|
$otv_session = [ |
6206
|
|
|
'otv' => true, |
6207
|
|
|
'code' => $orignal_link_parameters['code'], |
6208
|
|
|
'key' => $orignal_link_parameters['key'], |
6209
|
|
|
'stamp' => $orignal_link_parameters['stamp'], |
6210
|
|
|
]; |
6211
|
|
|
|
6212
|
|
|
if ((int) $dataReceived['shared_globaly'] === 1 && isset($SETTINGS['otv_subdomain']) === true && empty($SETTINGS['otv_subdomain']) === false) { |
6213
|
|
|
// Inject subdomain in URL by convering www. to subdomain. |
6214
|
|
|
$domain_scheme = parse_url($SETTINGS['cpassman_url'], PHP_URL_SCHEME); |
6215
|
|
|
$domain_host = parse_url($SETTINGS['cpassman_url'], PHP_URL_HOST); |
6216
|
|
|
if (str_contains($domain_host, 'www.') === true) { |
6217
|
|
|
$domain_host = (string) $SETTINGS['otv_subdomain'] . '.' . substr($domain_host, 4); |
6218
|
|
|
} else { |
6219
|
|
|
$domain_host = (string) $SETTINGS['otv_subdomain'] . '.' . $domain_host; |
6220
|
|
|
} |
6221
|
|
|
$url = $domain_scheme.'://'.$domain_host . '/index.php?'.http_build_query($otv_session); |
6222
|
|
|
} else { |
6223
|
|
|
$url = $SETTINGS['cpassman_url'] . '/index.php?'.http_build_query($otv_session); |
6224
|
|
|
} |
6225
|
|
|
|
6226
|
|
|
echo (string) prepareExchangedData( |
6227
|
|
|
array( |
6228
|
|
|
'error' => false, |
6229
|
|
|
'new_url' => $url, |
6230
|
|
|
), |
6231
|
|
|
'encode' |
6232
|
|
|
); |
6233
|
|
|
break; |
6234
|
|
|
|
6235
|
|
|
|
6236
|
|
|
/* |
6237
|
|
|
* CASE |
6238
|
|
|
* Free Item for Edition |
6239
|
|
|
*/ |
6240
|
|
|
case 'image_preview_preparation': |
6241
|
|
|
// Check KEY |
6242
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6243
|
|
|
echo (string) prepareExchangedData( |
6244
|
|
|
array( |
6245
|
|
|
'error' => true, |
6246
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6247
|
|
|
), |
6248
|
|
|
'encode' |
6249
|
|
|
); |
6250
|
|
|
break; |
6251
|
|
|
} |
6252
|
|
|
|
6253
|
|
|
// get file info |
6254
|
|
|
$file_info = DB::queryFirstRow( |
6255
|
|
|
'SELECT f.id AS id, f.file AS file, f.name AS name, f.status AS status, |
6256
|
|
|
f.extension AS extension, f.type AS type, |
6257
|
|
|
s.share_key AS share_key |
6258
|
|
|
FROM ' . prefixTable('files') . ' AS f |
6259
|
|
|
INNER JOIN ' . prefixTable('sharekeys_files') . ' AS s ON (f.id = s.object_id) |
6260
|
|
|
WHERE s.user_id = %i AND s.object_id = %i', |
6261
|
|
|
$session->get('user-id'), |
6262
|
|
|
$inputData['id'] |
6263
|
|
|
); |
6264
|
|
|
|
6265
|
|
|
// Check if user has this sharekey |
6266
|
|
|
if (empty($file_info['share_key']) === true) { |
6267
|
|
|
echo (string) prepareExchangedData( |
6268
|
|
|
array( |
6269
|
|
|
'error' => true, |
6270
|
|
|
'message' => $lang->get('no_sharekey_found'), |
6271
|
|
|
), |
6272
|
|
|
'encode' |
6273
|
|
|
); |
6274
|
|
|
break; |
6275
|
|
|
} |
6276
|
|
|
|
6277
|
|
|
//$fileName = basename($file_info['name'], '.'.$file_info['extension']); |
6278
|
|
|
|
6279
|
|
|
// prepare image info |
6280
|
|
|
$post_title = basename($file_info['name'], '.' . $file_info['extension']); |
6281
|
|
|
$post_title = isBase64($post_title) === true ? base64_decode($post_title) : $post_title; |
6282
|
|
|
|
6283
|
|
|
// Get image content |
6284
|
|
|
// deepcode ignore PT: File and path are secured directly inside the function decryptFile() |
6285
|
|
|
$fileContent = decryptFile( |
6286
|
|
|
$file_info['file'], |
6287
|
|
|
$SETTINGS['path_to_upload_folder'], |
6288
|
|
|
decryptUserObjectKey($file_info['share_key'], $session->get('user-private_key')) |
6289
|
|
|
); |
6290
|
|
|
|
6291
|
|
|
// Check error |
6292
|
|
|
if (isset($fileContent['error']) === true) { |
6293
|
|
|
echo (string) prepareExchangedData( |
6294
|
|
|
array( |
6295
|
|
|
'error' => true, |
6296
|
|
|
'message' => $fileContent['message'], |
6297
|
|
|
), |
6298
|
|
|
'encode' |
6299
|
|
|
); |
6300
|
|
|
break; |
6301
|
|
|
} |
6302
|
|
|
|
6303
|
|
|
// Encrypt data to return |
6304
|
|
|
echo (string) prepareExchangedData( |
6305
|
|
|
array( |
6306
|
|
|
'error' => false, |
6307
|
|
|
'filename' => $post_title . '.' . $file_info['extension'], |
6308
|
|
|
'file_type' => $file_info['type'], |
6309
|
|
|
'file_content' => $fileContent, |
6310
|
|
|
), |
6311
|
|
|
'encode' |
6312
|
|
|
); |
6313
|
|
|
break; |
6314
|
|
|
|
6315
|
|
|
/* |
6316
|
|
|
* CASE |
6317
|
|
|
* Get list of users that have access to the folder |
6318
|
|
|
*/ |
6319
|
|
|
case 'refresh_visible_folders': |
6320
|
|
|
// Check KEY |
6321
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6322
|
|
|
echo (string) prepareExchangedData( |
6323
|
|
|
array( |
6324
|
|
|
'error' => true, |
6325
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6326
|
|
|
), |
6327
|
|
|
'encode' |
6328
|
|
|
); |
6329
|
|
|
break; |
6330
|
|
|
} |
6331
|
|
|
$arr_data = []; |
6332
|
|
|
$arrayFolders = []; |
6333
|
|
|
|
6334
|
|
|
// decrypt and retreive data in JSON format |
6335
|
|
|
$dataReceived = prepareExchangedData( |
6336
|
|
|
$inputData['data'], |
6337
|
|
|
'decode' |
6338
|
|
|
); |
6339
|
|
|
|
6340
|
|
|
// Will we show the root folder? |
6341
|
|
|
if ($session->has('user-can_create_root_folder') && (int) $session->get('user-can_create_root_folder') && $session->has('user-can_create_root_folder') && (int) $session->get('user-can_create_root_folder') && null !== $session->get('user-can_create_root_folder') && (int) $session->get('user-can_create_root_folder') === 1 |
6342
|
|
|
) { |
6343
|
|
|
$arr_data['can_create_root_folder'] = 1; |
6344
|
|
|
} else { |
6345
|
|
|
$arr_data['can_create_root_folder'] = 0; |
6346
|
|
|
} |
6347
|
|
|
|
6348
|
|
|
// do we have a cache to be used? |
6349
|
|
|
if (isset($dataReceived['force_refresh_cache']) === true && $dataReceived['force_refresh_cache'] === false) { |
6350
|
|
|
$goCachedFolders = loadFoldersListByCache('visible_folders', 'folders'); |
6351
|
|
|
if ($goCachedFolders['state'] === true) { |
6352
|
|
|
$arr_data['folders'] = json_decode($goCachedFolders['data'], true); |
6353
|
|
|
// send data |
6354
|
|
|
echo (string) prepareExchangedData( |
6355
|
|
|
[ |
6356
|
|
|
'error' => 'false', |
6357
|
|
|
'html_json' => ($arr_data), |
6358
|
|
|
'extra' => isset($goCachedFolders['extra']) ? $goCachedFolders['extra'] : '', |
6359
|
|
|
], |
6360
|
|
|
'encode' |
6361
|
|
|
); |
6362
|
|
|
break; |
6363
|
|
|
} |
6364
|
|
|
} |
6365
|
|
|
// Build list of visible folders |
6366
|
|
|
if ( |
6367
|
|
|
(int) $session->get('user-admin') === 1 |
6368
|
|
|
) { |
6369
|
|
|
$session->set('user-accessible_folders', $session->get('user-personal_visible_folders')); |
6370
|
|
|
} |
6371
|
|
|
|
6372
|
|
|
if (null !== $session->get('user-list_folders_limited') && count($session->get('user-list_folders_limited')) > 0) { |
6373
|
|
|
$listFoldersLimitedKeys = array_keys($session->get('user-list_folders_limited')); |
6374
|
|
|
} else { |
6375
|
|
|
$listFoldersLimitedKeys = array(); |
6376
|
|
|
} |
6377
|
|
|
// list of items accessible but not in an allowed folder |
6378
|
|
|
if ( |
6379
|
|
|
null !== $session->get('system-list_restricted_folders_for_items') && |
6380
|
|
|
count($session->get('system-list_restricted_folders_for_items')) > 0 |
6381
|
|
|
) { |
6382
|
|
|
$listRestrictedFoldersForItemsKeys = array_keys($session->get('system-list_restricted_folders_for_items')); |
6383
|
|
|
} else { |
6384
|
|
|
$listRestrictedFoldersForItemsKeys = array(); |
6385
|
|
|
} |
6386
|
|
|
|
6387
|
|
|
//Build tree |
6388
|
|
|
$tree->rebuild(); |
6389
|
|
|
$folders = $tree->getDescendants(); |
6390
|
|
|
foreach ($folders as $folder) { |
6391
|
|
|
// Be sure that user can only see folders he/she is allowed to |
6392
|
|
|
if ( |
6393
|
|
|
in_array($folder->id, $session->get('user-forbiden_personal_folders')) === false |
6394
|
|
|
|| in_array($folder->id, $session->get('user-accessible_folders')) === true |
6395
|
|
|
|| in_array($folder->id, $listFoldersLimitedKeys) === true |
6396
|
|
|
|| in_array($folder->id, $listRestrictedFoldersForItemsKeys) === true |
6397
|
|
|
) { |
6398
|
|
|
// Init |
6399
|
|
|
$displayThisNode = false; |
6400
|
|
|
|
6401
|
|
|
// Check if any allowed folder is part of the descendants of this node |
6402
|
|
|
$nodeDescendants = $tree->getDescendantsFromTreeArray($folders, $folder->id); |
6403
|
|
|
foreach ($nodeDescendants as $node) { |
6404
|
|
|
// manage tree counters |
6405
|
|
|
if ( |
6406
|
|
|
in_array($node, array_merge($session->get('user-accessible_folders'), $session->get('system-list_restricted_folders_for_items'))) === true |
6407
|
|
|
|| (is_array($listFoldersLimitedKeys) === true && in_array($node, $listFoldersLimitedKeys) === true) |
6408
|
|
|
|| (is_array($listRestrictedFoldersForItemsKeys) === true && in_array($node, $listRestrictedFoldersForItemsKeys) === true) |
6409
|
|
|
) { |
6410
|
|
|
$displayThisNode = true; |
6411
|
|
|
break; |
6412
|
|
|
} |
6413
|
|
|
} |
6414
|
|
|
|
6415
|
|
|
if ($displayThisNode === true) { |
6416
|
|
|
// ALL FOLDERS |
6417
|
|
|
// Build path |
6418
|
|
|
$arbo = $tree->getPath($folder->id, false); |
6419
|
|
|
$path = ''; |
6420
|
|
|
foreach ($arbo as $elem) { |
6421
|
|
|
$path = (empty($path) ? '' : $path . ' / ') . htmlspecialchars(stripslashes(htmlspecialchars_decode($elem->title, ENT_QUOTES)), ENT_QUOTES); |
6422
|
|
|
} |
6423
|
|
|
|
6424
|
|
|
// Build array |
6425
|
|
|
array_push($arrayFolders, [ |
6426
|
|
|
'id' => (int) $folder->id, |
6427
|
|
|
'level' => (int) $folder->nlevel, |
6428
|
|
|
'title' => ((int) $folder->title === (int) $session->get('user-id') && (int) $folder->nlevel === 1) ? $session->get('user-login') : $folder->title, |
6429
|
|
|
'disabled' => ( |
6430
|
|
|
in_array($folder->id, $session->get('user-accessible_folders')) === false |
6431
|
|
|
|| in_array($folder->id, $session->get('user-read_only_folders')) === true |
6432
|
|
|
) ? 1 : 0, |
6433
|
|
|
'parent_id' => (int) $folder->parent_id, |
6434
|
|
|
'perso' => (int) $folder->personal_folder, |
6435
|
|
|
'path' => htmlspecialchars($path), |
6436
|
|
|
'is_visible_active' => (null !== $session->get('user-read_only_folders') && in_array($folder->id, $session->get('user-read_only_folders'))) ? 1 : 0, |
6437
|
|
|
]); |
6438
|
|
|
} |
6439
|
|
|
} |
6440
|
|
|
} |
6441
|
|
|
if (empty($arrayFolders) === false) { |
6442
|
|
|
// store array to return |
6443
|
|
|
$arr_data['folders'] = $arrayFolders; |
6444
|
|
|
|
6445
|
|
|
// update session |
6446
|
|
|
$session->set('user-folders_list', $arr_data['folders']); |
6447
|
|
|
|
6448
|
|
|
// update cache |
6449
|
|
|
cacheTreeUserHandler( |
6450
|
|
|
(int) $session->get('user-id'), |
6451
|
|
|
json_encode($arr_data['folders']), |
6452
|
|
|
$SETTINGS, |
6453
|
|
|
'visible_folders', |
6454
|
|
|
); |
6455
|
|
|
} |
6456
|
|
|
|
6457
|
|
|
// send data |
6458
|
|
|
echo (string) prepareExchangedData( |
6459
|
|
|
[ |
6460
|
|
|
'error' => 'false', |
6461
|
|
|
'html_json' => $arr_data, |
6462
|
|
|
], |
6463
|
|
|
'encode' |
6464
|
|
|
); |
6465
|
|
|
|
6466
|
|
|
break; |
6467
|
|
|
|
6468
|
|
|
/* |
6469
|
|
|
* CASE |
6470
|
|
|
* Get list of users that have access to the folder |
6471
|
|
|
*/ |
6472
|
|
|
case 'refresh_folders_other_info': |
6473
|
|
|
// Check KEY |
6474
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6475
|
|
|
echo (string) prepareExchangedData( |
6476
|
|
|
array( |
6477
|
|
|
'error' => true, |
6478
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6479
|
|
|
), |
6480
|
|
|
'encode' |
6481
|
|
|
); |
6482
|
|
|
break; |
6483
|
|
|
} |
6484
|
|
|
|
6485
|
|
|
$ret = []; |
6486
|
|
|
$foldersArray = json_decode($inputData['data'], true); |
6487
|
|
|
if (is_array($foldersArray) === true && $inputData['data'] !== '[null]') { |
6488
|
|
|
$rows = DB::query( |
6489
|
|
|
'SELECT id, categories |
6490
|
|
|
FROM ' . prefixTable('nested_tree') . ' |
6491
|
|
|
WHERE id IN (%l)', |
6492
|
|
|
implode(',', $foldersArray) |
6493
|
|
|
); |
6494
|
|
|
foreach ($rows as $record) { |
6495
|
|
|
if (empty($record['categories']) === false) { |
6496
|
|
|
array_push( |
6497
|
|
|
$ret, |
6498
|
|
|
array($record['id'] => json_decode($record['categories'], true)) |
6499
|
|
|
); |
6500
|
|
|
} |
6501
|
|
|
} |
6502
|
|
|
} |
6503
|
|
|
|
6504
|
|
|
// send data |
6505
|
|
|
echo (string) prepareExchangedData( |
6506
|
|
|
[ |
6507
|
|
|
'error' => '', |
6508
|
|
|
'result' => $ret, |
6509
|
|
|
], |
6510
|
|
|
'encode' |
6511
|
|
|
); |
6512
|
|
|
|
6513
|
|
|
break; |
6514
|
|
|
|
6515
|
|
|
/* |
6516
|
|
|
* CASE |
6517
|
|
|
* Load item history |
6518
|
|
|
*/ |
6519
|
|
|
case 'load_item_history': |
6520
|
|
|
// Check KEY |
6521
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6522
|
|
|
echo (string) prepareExchangedData( |
6523
|
|
|
array('error' => 'ERR_KEY_NOT_CORRECT'), |
6524
|
|
|
'encode' |
6525
|
|
|
); |
6526
|
|
|
break; |
6527
|
|
|
} |
6528
|
|
|
|
6529
|
|
|
// get item info |
6530
|
|
|
$dataItem = DB::queryFirstRow( |
6531
|
|
|
'SELECT * |
6532
|
|
|
FROM ' . prefixTable('items') . ' |
6533
|
|
|
WHERE id=%i', |
6534
|
|
|
$inputData['itemId'] |
6535
|
|
|
); |
6536
|
|
|
|
6537
|
|
|
// get item history |
6538
|
|
|
$history = []; |
6539
|
|
|
$previous_passwords = []; |
6540
|
|
|
$rows = DB::query( |
6541
|
|
|
'SELECT l.date as date, l.action as action, l.raison as raison, |
6542
|
|
|
u.login as login, u.avatar_thumb as avatar_thumb, u.name as name, u.lastname as lastname, |
6543
|
|
|
l.old_value as old_value |
6544
|
|
|
FROM ' . prefixTable('log_items') . ' as l |
6545
|
|
|
INNER JOIN ' . prefixTable('users') . ' as u ON (l.id_user=u.id) |
6546
|
|
|
WHERE id_item=%i AND l.action NOT IN (%l) |
6547
|
|
|
ORDER BY date DESC', |
6548
|
|
|
$inputData['itemId'], |
6549
|
|
|
'"at_shown","at_password_copied", "at_shown", "at_password_shown", "at_password_shown_edit_form"' |
6550
|
|
|
); |
6551
|
|
|
foreach ($rows as $record) { |
6552
|
|
|
if (empty($record['raison']) === true) { |
6553
|
|
|
$reason[0] = ''; |
6554
|
|
|
} else { |
6555
|
|
|
$reason = array_map('trim', explode(':', $record['raison'])); |
6556
|
|
|
} |
6557
|
|
|
|
6558
|
|
|
// imported via API |
6559
|
|
|
if (empty($record['login']) === true) { |
6560
|
|
|
$record['login'] = $lang->get('imported_via_api') . ' [' . $record['raison'] . ']'; |
6561
|
|
|
} |
6562
|
|
|
|
6563
|
|
|
// Prepare avatar |
6564
|
|
|
if (isset($record['avatar_thumb']) && empty($record['avatar_thumb']) === false) { |
6565
|
|
|
if (file_exists($SETTINGS['cpassman_dir'] . '/includes/avatars/' . $record['avatar_thumb'])) { |
6566
|
|
|
$avatar = $SETTINGS['cpassman_url'] . '/includes/avatars/' . $record['avatar_thumb']; |
6567
|
|
|
} else { |
6568
|
|
|
$avatar = $SETTINGS['cpassman_url'] . '/includes/images/photo.jpg'; |
6569
|
|
|
} |
6570
|
|
|
} else { |
6571
|
|
|
$avatar = $SETTINGS['cpassman_url'] . '/includes/images/photo.jpg'; |
6572
|
|
|
} |
6573
|
|
|
|
6574
|
|
|
// Prepare action |
6575
|
|
|
$action = ''; |
6576
|
|
|
$detail = ''; |
6577
|
|
|
if ($reason[0] === 'at_pw') { |
6578
|
|
|
$action = $lang->get($reason[0]); |
6579
|
|
|
|
6580
|
|
|
// get previous password |
6581
|
|
|
if (empty($record['old_value']) === false) { |
6582
|
|
|
$previous_pwd = cryption( |
6583
|
|
|
$record['old_value'], |
6584
|
|
|
'', |
6585
|
|
|
'decrypt' |
6586
|
|
|
); |
6587
|
|
|
array_push( |
6588
|
|
|
$previous_passwords, |
6589
|
|
|
[ |
6590
|
|
|
'password' => htmlentities($previous_pwd['string']), |
6591
|
|
|
'date' => date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date']), |
6592
|
|
|
] |
6593
|
|
|
); |
6594
|
|
|
} |
6595
|
|
|
} elseif ($record['action'] === 'at_manual') { |
6596
|
|
|
$detail = $reason[0]; |
6597
|
|
|
$action = $lang->get($record['action']); |
6598
|
|
|
} elseif ($reason[0] === 'at_description') { |
6599
|
|
|
$action = $lang->get('description_has_changed'); |
6600
|
|
|
} elseif (empty($record['raison']) === false && $reason[0] !== 'at_creation') { |
6601
|
|
|
$action = $lang->get($reason[0]); |
6602
|
|
|
if ($reason[0] === 'at_moved') { |
6603
|
|
|
$tmp = explode(' -> ', $reason[1]); |
6604
|
|
|
$detail = $lang->get('from') . ' <span class="font-weight-light">' . $tmp[0] . '</span> ' . $lang->get('to') . ' <span class="font-weight-light">' . $tmp[1] . ' </span>'; |
6605
|
|
|
} elseif ($reason[0] === 'at_field') { |
6606
|
|
|
$tmp = explode(' => ', $reason[1]); |
6607
|
|
|
if (count($tmp) > 1) { |
6608
|
|
|
$detail = '<b>' . trim($tmp[0]) . '</b> | ' . $lang->get('previous_value') . |
6609
|
|
|
': <span class="font-weight-light">' . trim($tmp[1]) . '</span>'; |
6610
|
|
|
} else { |
6611
|
|
|
$detail = trim($reason[1]); |
6612
|
|
|
} |
6613
|
|
|
} elseif (in_array($reason[0], array('at_restriction', 'at_email', 'at_login', 'at_label', 'at_url', 'at_tag')) === true) { |
6614
|
|
|
$tmp = explode(' => ', $reason[1]); |
6615
|
|
|
$detail = empty(trim($tmp[0])) === true ? |
6616
|
|
|
$lang->get('no_previous_value') : $lang->get('previous_value') . ': <span class="font-weight-light">' . $tmp[0] . ' </span>'; |
6617
|
|
|
} elseif ($reason[0] === 'at_automatic_del') { |
6618
|
|
|
$detail = $lang->get($reason[1]); |
6619
|
|
|
} elseif ($reason[0] === 'at_anyoneconmodify' || $reason[0] === 'at_otp_status' || $reason[0] === 'at_otp_secret' || $reason[0] === 'at_phone_number') { |
6620
|
|
|
$detail = $lang->get($reason[1]); |
6621
|
|
|
} elseif ($reason[0] === 'at_add_file' || $reason[0] === 'at_del_file') { |
6622
|
|
|
$tmp = explode(':', $reason[1]); |
6623
|
|
|
$tmp = explode('.', $tmp[0]); |
6624
|
|
|
$detail = isBase64($tmp[0]) === true ? |
6625
|
|
|
base64_decode($tmp[0]) . '.' . $tmp[1] : $tmp[0]; |
6626
|
|
|
} elseif ($reason[0] === 'at_import') { |
6627
|
|
|
$detail = ''; |
6628
|
|
|
} elseif (in_array($reason[0], array('csv', 'pdf')) === true) { |
6629
|
|
|
$detail = $reason[0]; |
6630
|
|
|
$action = $lang->get('exported_to_file'); |
6631
|
|
|
} else { |
6632
|
|
|
$detail = $reason[0]; |
6633
|
|
|
} |
6634
|
|
|
} else { |
6635
|
|
|
$detail = $lang->get($record['action']); |
6636
|
|
|
$action = ''; |
6637
|
|
|
} |
6638
|
|
|
|
6639
|
|
|
array_push( |
6640
|
|
|
$history, |
6641
|
|
|
array( |
6642
|
|
|
'avatar' => $avatar, |
6643
|
|
|
'login' => $record['login'], |
6644
|
|
|
'name' => $record['name'] . ' ' . $record['lastname'], |
6645
|
|
|
'date' => date($SETTINGS['date_format'] . ' ' . $SETTINGS['time_format'], (int) $record['date']), |
6646
|
|
|
'action' => $action, |
6647
|
|
|
'detail' => $detail, |
6648
|
|
|
) |
6649
|
|
|
); |
6650
|
|
|
} |
6651
|
|
|
|
6652
|
|
|
// order previous passwords by date |
6653
|
|
|
$key_values = array_column($previous_passwords, 'date'); |
6654
|
|
|
array_multisort($key_values, /** @scrutinizer ignore-type */SORT_DESC, $previous_passwords); |
6655
|
|
|
|
6656
|
|
|
// send data |
6657
|
|
|
// deepcode ignore ServerLeak: Data is encrypted before being sent |
6658
|
|
|
echo (string) prepareExchangedData( |
6659
|
|
|
[ |
6660
|
|
|
'error' => '', |
6661
|
|
|
'history' => $history, |
6662
|
|
|
'previous_passwords' => $previous_passwords, |
6663
|
|
|
], |
6664
|
|
|
'encode' |
6665
|
|
|
); |
6666
|
|
|
|
6667
|
|
|
break; |
6668
|
|
|
|
6669
|
|
|
case 'suggest_item_change': |
6670
|
|
|
// Check KEY |
6671
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6672
|
|
|
echo (string) prepareExchangedData( |
6673
|
|
|
array( |
6674
|
|
|
'error' => 'key_not_conform', |
6675
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6676
|
|
|
), |
6677
|
|
|
'encode' |
6678
|
|
|
); |
6679
|
|
|
break; |
6680
|
|
|
} |
6681
|
|
|
// decrypt and retrieve data in JSON format |
6682
|
|
|
$data_received = prepareExchangedData( |
6683
|
|
|
$inputData['data'], |
6684
|
|
|
'decode' |
6685
|
|
|
); |
6686
|
|
|
|
6687
|
|
|
// prepare variables |
6688
|
|
|
$label = htmlspecialchars_decode($data_received['label'], ENT_QUOTES); |
6689
|
|
|
$pwd = htmlspecialchars_decode($data_received['password']); |
6690
|
|
|
$login = htmlspecialchars_decode($data_received['login'], ENT_QUOTES); |
6691
|
|
|
$email = htmlspecialchars_decode($data_received['email']); |
6692
|
|
|
$url = htmlspecialchars_decode($data_received['url']); |
6693
|
|
|
$folder = htmlspecialchars_decode($data_received['folder_id']); |
6694
|
|
|
$comment = htmlspecialchars_decode($data_received['comment']); |
6695
|
|
|
$item_id = htmlspecialchars_decode($data_received['item_id']); |
6696
|
|
|
|
6697
|
|
|
if (empty($pwd)) { |
6698
|
|
|
$cryptedStuff['encrypted'] = ''; |
6699
|
|
|
$cryptedStuff['objectKey'] = ''; |
6700
|
|
|
} else { |
6701
|
|
|
$cryptedStuff = doDataEncryption($pwd); |
6702
|
|
|
} |
6703
|
|
|
|
6704
|
|
|
// query |
6705
|
|
|
DB::insert( |
6706
|
|
|
prefixTable('items_change'), |
6707
|
|
|
array( |
6708
|
|
|
'item_id' => $item_id, |
6709
|
|
|
'label' => $label, |
6710
|
|
|
'pw' => $cryptedStuff['encrypted'], |
6711
|
|
|
'login' => $login, |
6712
|
|
|
'email' => $email, |
6713
|
|
|
'url' => $url, |
6714
|
|
|
'description' => '', |
6715
|
|
|
'comment' => $comment, |
6716
|
|
|
'folder_id' => $folder, |
6717
|
|
|
'user_id' => (int) $session->get('user-id'), |
6718
|
|
|
'timestamp' => time(), |
6719
|
|
|
) |
6720
|
|
|
); |
6721
|
|
|
$newID = DB::insertId(); |
6722
|
|
|
|
6723
|
|
|
// Create sharekeys for users |
6724
|
|
|
storeUsersShareKey( |
6725
|
|
|
prefixTable('sharekeys_items'), |
6726
|
|
|
0, |
6727
|
|
|
(int) $newID, |
6728
|
|
|
$cryptedStuff['objectKey'], |
6729
|
|
|
); |
6730
|
|
|
|
6731
|
|
|
// get some info to add to the notification email |
6732
|
|
|
$resp_user = DB::queryFirstRow( |
6733
|
|
|
'SELECT login FROM ' . prefixTable('users') . ' WHERE id = %i', |
6734
|
|
|
$session->get('user-id') |
6735
|
|
|
); |
6736
|
|
|
$resp_folder = DB::queryFirstRow( |
6737
|
|
|
'SELECT title FROM ' . prefixTable('nested_tree') . ' WHERE id = %i', |
6738
|
|
|
$folder |
6739
|
|
|
); |
6740
|
|
|
|
6741
|
|
|
// notify Managers |
6742
|
|
|
$emailSettings = new EmailSettings($SETTINGS); |
6743
|
|
|
$emailService = new EmailService(); |
6744
|
|
|
$rows = DB::query( |
6745
|
|
|
'SELECT email |
6746
|
|
|
FROM ' . prefixTable('users') . ' |
6747
|
|
|
WHERE `gestionnaire` = %i AND `email` IS NOT NULL', |
6748
|
|
|
1 |
6749
|
|
|
); |
6750
|
|
|
foreach ($rows as $record) { |
6751
|
|
|
$emailService->sendMail( |
6752
|
|
|
$lang->get('suggestion_notify_subject'), |
6753
|
|
|
str_replace(array('#tp_label#', '#tp_user#', '#tp_folder#'), array(addslashes($label), addslashes($resp_user['login']), addslashes($resp_folder['title'])), $lang->get('suggestion_notify_body')), |
6754
|
|
|
$record['email'], |
6755
|
|
|
$emailSettings |
6756
|
|
|
); |
6757
|
|
|
} |
6758
|
|
|
|
6759
|
|
|
echo (string) prepareExchangedData( |
6760
|
|
|
array( |
6761
|
|
|
'error' => '', |
6762
|
|
|
), |
6763
|
|
|
'encode' |
6764
|
|
|
); |
6765
|
|
|
break; |
6766
|
|
|
|
6767
|
|
|
case 'send_request_access': |
6768
|
|
|
// Check KEY |
6769
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6770
|
|
|
echo (string) prepareExchangedData( |
6771
|
|
|
array( |
6772
|
|
|
'error' => 'key_not_conform', |
6773
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6774
|
|
|
), |
6775
|
|
|
'encode' |
6776
|
|
|
); |
6777
|
|
|
break; |
6778
|
|
|
} |
6779
|
|
|
// decrypt and retrieve data in JSON format |
6780
|
|
|
$dataReceived = prepareExchangedData( |
6781
|
|
|
$inputData['data'], |
6782
|
|
|
'decode' |
6783
|
|
|
); |
6784
|
|
|
|
6785
|
|
|
// prepare variables |
6786
|
|
|
//$post_email_body = filter_var($dataReceived['email'], FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
6787
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['id'], FILTER_SANITIZE_NUMBER_INT); |
6788
|
|
|
|
6789
|
|
|
// Send email |
6790
|
|
|
$dataItem = DB::queryFirstRow( |
6791
|
|
|
'SELECT label, id_tree |
6792
|
|
|
FROM ' . prefixTable('items') . ' |
6793
|
|
|
WHERE id = %i', |
6794
|
|
|
$inputData['itemId'] |
6795
|
|
|
); |
6796
|
|
|
|
6797
|
|
|
// Do log |
6798
|
|
|
logItems( |
6799
|
|
|
$SETTINGS, |
6800
|
|
|
(int) $inputData['itemId'], |
6801
|
|
|
$dataItem['label'], |
6802
|
|
|
$session->get('user-id'), |
6803
|
|
|
'at_access', |
6804
|
|
|
$session->get('user-login') |
6805
|
|
|
); |
6806
|
|
|
|
6807
|
|
|
// Return |
6808
|
|
|
echo (string) prepareExchangedData( |
6809
|
|
|
array( |
6810
|
|
|
'error' => false, |
6811
|
|
|
'message' => '', |
6812
|
|
|
), |
6813
|
|
|
'encode' |
6814
|
|
|
); |
6815
|
|
|
|
6816
|
|
|
break; |
6817
|
|
|
|
6818
|
|
|
/* |
6819
|
|
|
* CASE |
6820
|
|
|
* save_notification_status |
6821
|
|
|
*/ |
6822
|
|
|
case 'save_notification_status': |
6823
|
|
|
// Check KEY |
6824
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6825
|
|
|
echo (string) prepareExchangedData( |
6826
|
|
|
array( |
6827
|
|
|
'error' => 'key_not_conform', |
6828
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6829
|
|
|
), |
6830
|
|
|
'encode' |
6831
|
|
|
); |
6832
|
|
|
break; |
6833
|
|
|
} |
6834
|
|
|
// decrypt and retrieve data in JSON format |
6835
|
|
|
$dataReceived = prepareExchangedData( |
6836
|
|
|
$inputData['data'], |
6837
|
|
|
'decode' |
6838
|
|
|
); |
6839
|
|
|
|
6840
|
|
|
// prepare variables |
6841
|
|
|
$post_notification_status = (int) filter_var($dataReceived['notification_status'], FILTER_SANITIZE_NUMBER_INT); |
6842
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
6843
|
|
|
|
6844
|
|
|
DB::query( |
6845
|
|
|
'SELECT * |
6846
|
|
|
FROM ' . prefixTable('notification') . ' |
6847
|
|
|
WHERE item_id = %i AND user_id = %i', |
6848
|
|
|
$inputData['itemId'], |
6849
|
|
|
$session->get('user-id') |
6850
|
|
|
); |
6851
|
|
|
if (DB::count() > 0) { |
6852
|
|
|
// Notification is set for this user on this item |
6853
|
|
|
if ((int) $post_notification_status === 0) { |
6854
|
|
|
// Remove the notification |
6855
|
|
|
DB::delete( |
6856
|
|
|
prefixTable('notification'), |
6857
|
|
|
'item_id = %i AND user_id = %i', |
6858
|
|
|
$inputData['itemId'], |
6859
|
|
|
$session->get('user-id') |
6860
|
|
|
); |
6861
|
|
|
} |
6862
|
|
|
} else { |
6863
|
|
|
// Notification is not set on this item |
6864
|
|
|
if ((int) $post_notification_status === 1) { |
6865
|
|
|
// Add the notification |
6866
|
|
|
DB::insert( |
6867
|
|
|
prefixTable('notification'), |
6868
|
|
|
array( |
6869
|
|
|
'item_id' => $inputData['itemId'], |
6870
|
|
|
'user_id' => (int) $session->get('user-id'), |
6871
|
|
|
) |
6872
|
|
|
); |
6873
|
|
|
} |
6874
|
|
|
} |
6875
|
|
|
|
6876
|
|
|
$data = array( |
6877
|
|
|
'error' => false, |
6878
|
|
|
'message' => '', |
6879
|
|
|
); |
6880
|
|
|
|
6881
|
|
|
// send data |
6882
|
|
|
echo (string) prepareExchangedData( |
6883
|
|
|
$data, |
6884
|
|
|
'encode' |
6885
|
|
|
); |
6886
|
|
|
|
6887
|
|
|
break; |
6888
|
|
|
|
6889
|
|
|
/* |
6890
|
|
|
* CASE |
6891
|
|
|
* delete_uploaded_files_but_not_saved |
6892
|
|
|
*/ |
6893
|
|
|
case 'delete_uploaded_files_but_not_saved': |
6894
|
|
|
// Check KEY |
6895
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6896
|
|
|
echo (string) prepareExchangedData( |
6897
|
|
|
array( |
6898
|
|
|
'error' => 'key_not_conform', |
6899
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6900
|
|
|
), |
6901
|
|
|
'encode' |
6902
|
|
|
); |
6903
|
|
|
break; |
6904
|
|
|
} |
6905
|
|
|
// decrypt and retrieve data in JSON format |
6906
|
|
|
$dataReceived = prepareExchangedData( |
6907
|
|
|
$inputData['data'], |
6908
|
|
|
'decode' |
6909
|
|
|
); |
6910
|
|
|
|
6911
|
|
|
// prepare variables |
6912
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
6913
|
|
|
|
6914
|
|
|
// Delete non confirmed files for this item |
6915
|
|
|
// And related logs |
6916
|
|
|
$rows = DB::query( |
6917
|
|
|
'SELECT id, file AS filename |
6918
|
|
|
FROM ' . prefixTable('files') . ' |
6919
|
|
|
WHERE id_item = %i AND confirmed = %i', |
6920
|
|
|
$inputData['itemId'], |
6921
|
|
|
0 |
6922
|
|
|
); |
6923
|
|
|
foreach ($rows as $file) { |
6924
|
|
|
// Delete file in DB |
6925
|
|
|
DB::delete( |
6926
|
|
|
prefixTable('files'), |
6927
|
|
|
'id = %i', |
6928
|
|
|
$file['id'] |
6929
|
|
|
); |
6930
|
|
|
|
6931
|
|
|
// Delete file on server |
6932
|
|
|
unlink($SETTINGS['path_to_upload_folder'] . '/' . TP_FILE_PREFIX . base64_decode($file['filename'])); |
6933
|
|
|
|
6934
|
|
|
// Delete related logs |
6935
|
|
|
$logFile = DB::query( |
6936
|
|
|
'SELECT increment_id, raison |
6937
|
|
|
FROM ' . prefixTable('log_items') . ' |
6938
|
|
|
WHERE id_item = %i AND id_user = %i AND action = %s AND raison LIKE "at_add_file :%"', |
6939
|
|
|
$inputData['itemId'], |
6940
|
|
|
$session->get('user-id'), |
6941
|
|
|
'at_modification' |
6942
|
|
|
); |
6943
|
|
|
foreach ($logFile as $log) { |
6944
|
|
|
$tmp = explode(':', $log['raison']); |
6945
|
|
|
if (count($tmp) === 3 && (int) $tmp[2] === (int) $file['id']) { |
6946
|
|
|
DB::delete( |
6947
|
|
|
prefixTable('log_items'), |
6948
|
|
|
'increment_id = %i', |
6949
|
|
|
$log['increment_id'] |
6950
|
|
|
); |
6951
|
|
|
} |
6952
|
|
|
} |
6953
|
|
|
} |
6954
|
|
|
|
6955
|
|
|
$data = array( |
6956
|
|
|
'error' => false, |
6957
|
|
|
'message' => '', |
6958
|
|
|
); |
6959
|
|
|
|
6960
|
|
|
// send data |
6961
|
|
|
echo (string) prepareExchangedData( |
6962
|
|
|
$data, |
6963
|
|
|
'encode' |
6964
|
|
|
); |
6965
|
|
|
|
6966
|
|
|
break; |
6967
|
|
|
|
6968
|
|
|
/* |
6969
|
|
|
* CASE |
6970
|
|
|
* confirm_attachments |
6971
|
|
|
*/ |
6972
|
|
|
case 'confirm_attachments': |
6973
|
|
|
// Check KEY |
6974
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
6975
|
|
|
echo (string) prepareExchangedData( |
6976
|
|
|
array( |
6977
|
|
|
'error' => 'key_not_conform', |
6978
|
|
|
'message' => $lang->get('key_is_not_correct'), |
6979
|
|
|
), |
6980
|
|
|
'encode' |
6981
|
|
|
); |
6982
|
|
|
break; |
6983
|
|
|
} |
6984
|
|
|
// decrypt and retrieve data in JSON format |
6985
|
|
|
$dataReceived = prepareExchangedData( |
6986
|
|
|
$inputData['data'], |
6987
|
|
|
'decode' |
6988
|
|
|
); |
6989
|
|
|
|
6990
|
|
|
// prepare variables |
6991
|
|
|
$inputData['itemId'] = (int) filter_var($dataReceived['item_id'], FILTER_SANITIZE_NUMBER_INT); |
6992
|
|
|
|
6993
|
|
|
// Confirm attachments |
6994
|
|
|
$rows = DB::query( |
6995
|
|
|
'SELECT id, file AS filename |
6996
|
|
|
FROM ' . prefixTable('files') . ' |
6997
|
|
|
WHERE id_item = %i AND confirmed = %i', |
6998
|
|
|
$inputData['itemId'], |
6999
|
|
|
0 |
7000
|
|
|
); |
7001
|
|
|
foreach ($rows as $file) { |
7002
|
|
|
DB::update( |
7003
|
|
|
prefixTable('files'), |
7004
|
|
|
array( |
7005
|
|
|
'confirmed' => 1, |
7006
|
|
|
), |
7007
|
|
|
'id_item = %i', |
7008
|
|
|
$inputData['itemId'] |
7009
|
|
|
); |
7010
|
|
|
} |
7011
|
|
|
|
7012
|
|
|
$data = array( |
7013
|
|
|
'error' => false, |
7014
|
|
|
'message' => '', |
7015
|
|
|
); |
7016
|
|
|
|
7017
|
|
|
// send data |
7018
|
|
|
echo (string) prepareExchangedData( |
7019
|
|
|
$data, |
7020
|
|
|
'encode' |
7021
|
|
|
); |
7022
|
|
|
|
7023
|
|
|
break; |
7024
|
|
|
|
7025
|
|
|
/* |
7026
|
|
|
* CASE |
7027
|
|
|
* check_current_access_rights |
7028
|
|
|
*/ |
7029
|
|
|
case 'check_current_access_rights': |
7030
|
|
|
// Check KEY |
7031
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
7032
|
|
|
echo (string) prepareExchangedData( |
7033
|
|
|
array( |
7034
|
|
|
'error' => 'key_not_conform', |
7035
|
|
|
'message' => $lang->get('key_is_not_correct'), |
7036
|
|
|
), |
7037
|
|
|
'encode' |
7038
|
|
|
); |
7039
|
|
|
break; |
7040
|
|
|
} |
7041
|
|
|
|
7042
|
|
|
// Init |
7043
|
|
|
$editionLock = false; |
7044
|
|
|
|
7045
|
|
|
// decrypt and retrieve data in JSON format |
7046
|
|
|
$dataReceived = prepareExchangedData( |
7047
|
|
|
$inputData['data'], |
7048
|
|
|
'decode' |
7049
|
|
|
); |
7050
|
|
|
|
7051
|
|
|
// Check rights |
7052
|
|
|
$data = getCurrentAccessRights( |
7053
|
|
|
(int) filter_var($dataReceived['userId'], FILTER_SANITIZE_NUMBER_INT), |
7054
|
|
|
(int) filter_var($dataReceived['itemId'], FILTER_SANITIZE_NUMBER_INT), |
7055
|
|
|
(int) filter_var($dataReceived['treeId'], FILTER_SANITIZE_NUMBER_INT), |
7056
|
|
|
(string) filter_var($dataReceived['action'], FILTER_SANITIZE_SPECIAL_CHARS), |
7057
|
|
|
); |
7058
|
|
|
|
7059
|
|
|
// send data |
7060
|
|
|
echo (string) prepareExchangedData( |
7061
|
|
|
$data, |
7062
|
|
|
'encode' |
7063
|
|
|
); |
7064
|
|
|
|
7065
|
|
|
break; |
7066
|
|
|
|
7067
|
|
|
/* |
7068
|
|
|
* CASE |
7069
|
|
|
* items_delete |
7070
|
|
|
*/ |
7071
|
|
|
case 'items_delete': |
7072
|
|
|
// Check KEY |
7073
|
|
|
if ($inputData['key'] !== $session->get('key')) { |
7074
|
|
|
echo (string) prepareExchangedData( |
7075
|
|
|
array( |
7076
|
|
|
'error' => 'key_not_conform', |
7077
|
|
|
'message' => $lang->get('key_is_not_correct'), |
7078
|
|
|
), |
7079
|
|
|
'encode' |
7080
|
|
|
); |
7081
|
|
|
break; |
7082
|
|
|
} |
7083
|
|
|
|
7084
|
|
|
if ($session->get('user-read_only') === 1) { |
7085
|
|
|
echo (string) prepareExchangedData( |
7086
|
|
|
array( |
7087
|
|
|
'error' => true, |
7088
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
7089
|
|
|
), |
7090
|
|
|
'encode' |
7091
|
|
|
); |
7092
|
|
|
break; |
7093
|
|
|
} |
7094
|
|
|
|
7095
|
|
|
// decrypt and retrieve data in JSON format |
7096
|
|
|
$dataReceived = prepareExchangedData( |
7097
|
|
|
$inputData['data'], |
7098
|
|
|
'decode' |
7099
|
|
|
); |
7100
|
|
|
|
7101
|
|
|
// Prepare POST variables |
7102
|
|
|
$selectedItemIdsJson = $dataReceived['selectedItemIds'] ?? '[]'; |
7103
|
|
|
$selectedItemIds = json_decode($selectedItemIdsJson, true) ?: array(); |
7104
|
|
|
$selectedItemIds = array_map(function($id) { |
7105
|
|
|
return filter_var($id, FILTER_SANITIZE_FULL_SPECIAL_CHARS); |
7106
|
|
|
}, $selectedItemIds); |
7107
|
|
|
|
7108
|
|
|
// Initialiser les variables de gestion d'erreurs |
7109
|
|
|
$successfulDeletions = array(); |
7110
|
|
|
$failedDeletions = array(); |
7111
|
|
|
|
7112
|
|
|
foreach( $selectedItemIds as $itemId) { |
7113
|
|
|
// Check that user can access this item |
7114
|
|
|
$granted = accessToItemIsGranted((int) $itemId, $SETTINGS); |
7115
|
|
|
if ($granted !== true) { |
7116
|
|
|
$failedDeletions[$itemId] = $granted; |
7117
|
|
|
continue; // Passer à l'item suivant |
7118
|
|
|
} |
7119
|
|
|
|
7120
|
|
|
// Load item data |
7121
|
|
|
$data = DB::queryFirstRow( |
7122
|
|
|
'SELECT id_tree, id, label |
7123
|
|
|
FROM ' . prefixTable('items') . ' |
7124
|
|
|
WHERE id = %i', |
7125
|
|
|
$itemId |
7126
|
|
|
); |
7127
|
|
|
if ($data === null) { |
7128
|
|
|
$failedDeletions[$itemId] = $lang->get('error_item_not_found'); |
7129
|
|
|
continue; // Passer à l'item suivant |
7130
|
|
|
} |
7131
|
|
|
$itemLabel = $data['label']; |
7132
|
|
|
$itemTreeId = (int) $data['id_tree']; |
7133
|
|
|
|
7134
|
|
|
// Check that user can delete on this folder |
7135
|
|
|
$checkRights = getCurrentAccessRights( |
7136
|
|
|
$session->get('user-id'), |
7137
|
|
|
(int) $itemId, |
7138
|
|
|
$itemTreeId, |
7139
|
|
|
); |
7140
|
|
|
|
7141
|
|
|
if ($checkRights['error'] || !$checkRights['delete']) { |
7142
|
|
|
echo (string) prepareExchangedData( |
7143
|
|
|
array( |
7144
|
|
|
'error' => true, |
7145
|
|
|
'message' => $lang->get('error_not_allowed_to'), |
7146
|
|
|
), |
7147
|
|
|
'encode' |
7148
|
|
|
); |
7149
|
|
|
} |
7150
|
|
|
|
7151
|
|
|
// delete item consists in disabling it |
7152
|
|
|
DB::update( |
7153
|
|
|
prefixTable('items'), |
7154
|
|
|
array( |
7155
|
|
|
'inactif' => '1', |
7156
|
|
|
'deleted_at' => time(), |
7157
|
|
|
), |
7158
|
|
|
'id = %i', |
7159
|
|
|
$itemId |
7160
|
|
|
); |
7161
|
|
|
|
7162
|
|
|
// log |
7163
|
|
|
logItems( |
7164
|
|
|
$SETTINGS, |
7165
|
|
|
(int) $itemId, |
7166
|
|
|
$itemLabel, |
7167
|
|
|
$session->get('user-id'), |
7168
|
|
|
'at_delete', |
7169
|
|
|
$session->get('user-login') |
7170
|
|
|
); |
7171
|
|
|
|
7172
|
|
|
// Update CACHE table |
7173
|
|
|
updateCacheTable('delete_value', (int) $itemId); |
7174
|
|
|
|
7175
|
|
|
// Ajouter l'item à la liste des succès |
7176
|
|
|
$successfulDeletions[] = $itemId; |
7177
|
|
|
} |
7178
|
|
|
|
7179
|
|
|
// Préparer la réponse |
7180
|
|
|
$response = array( |
7181
|
|
|
'successfulDeletions' => $successfulDeletions, |
7182
|
|
|
'failedDeletions' => $failedDeletions, |
7183
|
|
|
'error' => !empty($failedDeletions), // Indiquer s'il y a eu des erreurs |
7184
|
|
|
'message' => !empty($failedDeletions) ? $lang->get('some_items_failed_to_delete') : $lang->get('all_items_deleted_successfully') |
7185
|
|
|
); |
7186
|
|
|
|
7187
|
|
|
// send data |
7188
|
|
|
echo (string) prepareExchangedData( |
7189
|
|
|
$response, |
7190
|
|
|
'encode' |
7191
|
|
|
); |
7192
|
|
|
|
7193
|
|
|
break; |
7194
|
|
|
} |
7195
|
|
|
|
7196
|
|
|
// Build the QUERY in case of GET |
7197
|
|
|
if (isset($inputData['getType'])) { |
7198
|
|
|
switch ($inputData['getType']) { |
7199
|
|
|
/* |
7200
|
|
|
* CASE |
7201
|
|
|
* Autocomplet for TAGS |
7202
|
|
|
*/ |
7203
|
|
|
case 'autocomplete_tags': |
7204
|
|
|
// Get a list off all existing TAGS |
7205
|
|
|
$listOfTags = ''; |
7206
|
|
|
$rows = DB::query('SELECT tag FROM ' . prefixTable('tags') . ' WHERE tag LIKE %ss GROUP BY tag', $inputData['getTerm']); |
7207
|
|
|
foreach ($rows as $record) { |
7208
|
|
|
if (empty($listOfTags)) { |
7209
|
|
|
$listOfTags = '"' . $record['tag'] . '"'; |
7210
|
|
|
} else { |
7211
|
|
|
$listOfTags .= ', "' . $record['tag'] . '"'; |
7212
|
|
|
} |
7213
|
|
|
} |
7214
|
|
|
echo '[' . $listOfTags . ']'; |
7215
|
|
|
break; |
7216
|
|
|
} |
7217
|
|
|
} |
7218
|
|
|
|
7219
|
|
|
/** |
7220
|
|
|
* Identify if this group authorize creation of item without the complexit level reached |
7221
|
|
|
* |
7222
|
|
|
* @param int $groupe ID for group |
7223
|
|
|
* |
7224
|
|
|
* @return array list of roles |
7225
|
|
|
*/ |
7226
|
|
|
function recupDroitCreationSansComplexite($groupe) |
7227
|
|
|
{ |
7228
|
|
|
$data = DB::queryFirstRow( |
7229
|
|
|
'SELECT bloquer_creation, bloquer_modification, personal_folder |
7230
|
|
|
FROM ' . prefixTable('nested_tree') . ' WHERE id = %i', |
7231
|
|
|
$groupe |
7232
|
|
|
); |
7233
|
|
|
// Check if it's in a personal folder. If yes, then force complexity overhead. |
7234
|
|
|
if ($data !== null && (int) $data['personal_folder'] === 1) { |
7235
|
|
|
return array( |
7236
|
|
|
'bloquer_modification_complexite' => 1, |
7237
|
|
|
'bloquer_creation_complexite' => 1, |
7238
|
|
|
); |
7239
|
|
|
} |
7240
|
|
|
|
7241
|
|
|
return array( |
7242
|
|
|
'bloquer_modification_complexite' => $data !== null ? (int) $data['bloquer_modification'] : 0, |
7243
|
|
|
'bloquer_creation_complexite' => $data !== null ? (int) $data['bloquer_creation'] : 0, |
7244
|
|
|
); |
7245
|
|
|
} |
7246
|
|
|
|
7247
|
|
|
/** |
7248
|
|
|
* Permits to identify what icon to display depending on file extension. |
7249
|
|
|
* |
7250
|
|
|
* @param string $ext extension |
7251
|
|
|
* |
7252
|
|
|
* @return string |
7253
|
|
|
*/ |
7254
|
|
|
function fileFormatImage($ext) |
7255
|
|
|
{ |
7256
|
|
|
if (in_array($ext, TP_OFFICE_FILE_EXT)) { |
7257
|
|
|
$image = 'fas fa-file-word'; |
7258
|
|
|
} elseif ($ext === 'pdf') { |
7259
|
|
|
$image = 'fas fa-file-pdf'; |
7260
|
|
|
} elseif (in_array($ext, TP_IMAGE_FILE_EXT)) { |
7261
|
|
|
$image = 'fas fa-file-image'; |
7262
|
|
|
} elseif ($ext === 'txt') { |
7263
|
|
|
$image = 'fas fa-file-alt'; |
7264
|
|
|
} else { |
7265
|
|
|
$image = 'fas fa-file'; |
7266
|
|
|
} |
7267
|
|
|
|
7268
|
|
|
return $image; |
7269
|
|
|
} |
7270
|
|
|
|
7271
|
|
|
|
7272
|
|
|
/** |
7273
|
|
|
* Get rights of user on specific folder/item. |
7274
|
|
|
* |
7275
|
|
|
* @param int $userId ID of user. |
7276
|
|
|
* @param int $itemId ID of item. |
7277
|
|
|
* @param int $treeId ID of folder. |
7278
|
|
|
* @param string $action Type of action (e.g., 'edit', 'delete'). |
7279
|
|
|
* |
7280
|
|
|
* @return array with access rights. |
7281
|
|
|
*/ |
7282
|
|
|
function getCurrentAccessRights(int $userId, int $itemId, int $treeId, string $action = ''): array |
7283
|
|
|
{ |
7284
|
|
|
$session = SessionManager::getSession(); |
7285
|
|
|
|
7286
|
|
|
// Check if the item is locked and whether the current user can edit it |
7287
|
|
|
$editionLock = isItemLocked($itemId, $session, $userId, $action); |
7288
|
|
|
|
7289
|
|
|
// Check if user is allowed restriction list of users |
7290
|
|
|
// If the item is restricted to specific users, check if the current user is in that list |
7291
|
|
|
if (getItemRestrictedUsersList($itemId, $userId) === false) { |
7292
|
|
|
return getAccessResponse(false, false, false, false); |
7293
|
|
|
} |
7294
|
|
|
|
7295
|
|
|
// Check if the item is being processed by another user |
7296
|
|
|
if (isProcessOnGoing($itemId)) { |
7297
|
|
|
return getAccessResponse(false, true, false, false); |
7298
|
|
|
} |
7299
|
|
|
|
7300
|
|
|
// Retrieve user's visible folders from the cache_tree table |
7301
|
|
|
$visibleFolders = getUserVisibleFolders($userId); |
7302
|
|
|
|
7303
|
|
|
// Check if the folder is in the user's read-only list |
7304
|
|
|
if (in_array($treeId, $session->get('user-read_only_folders'))) { |
7305
|
|
|
return getAccessResponse(false, true, false, false); |
7306
|
|
|
} |
7307
|
|
|
|
7308
|
|
|
// Check if the folder is in the user's allowed folders list defined by admin |
7309
|
|
|
if (in_array($treeId, $session->get('user-allowed_folders_by_definition'))) { |
7310
|
|
|
return getAccessResponse(false, true, true, true); |
7311
|
|
|
} |
7312
|
|
|
|
7313
|
|
|
// Check if the folder is personal to the user |
7314
|
|
|
foreach ($visibleFolders as $folder) { |
7315
|
|
|
if ($folder['id'] == $treeId && (int) $folder['perso'] === 1) { |
7316
|
|
|
return getAccessResponse(false, true, true, true); |
7317
|
|
|
} |
7318
|
|
|
} |
7319
|
|
|
|
7320
|
|
|
// Determine the user's access rights based on their roles for this folder |
7321
|
|
|
[$edit, $delete] = getRoleBasedAccess($session, $treeId); |
7322
|
|
|
|
7323
|
|
|
// Log access rights information if logging is enabled |
7324
|
|
|
if (LOG_TO_SERVER === true) { |
7325
|
|
|
error_log("TEAMPASS - Folder: $treeId - User: $userId - edit: $edit - delete: $delete"); |
7326
|
|
|
} |
7327
|
|
|
|
7328
|
|
|
return getAccessResponse(false, true, $edit, $delete, $editionLock); |
7329
|
|
|
} |
7330
|
|
|
|
7331
|
|
|
/** |
7332
|
|
|
* Get user access restriction response. |
7333
|
|
|
* |
7334
|
|
|
* @param int $itemId The ID of the item to check |
7335
|
|
|
* @param int $userId The ID of the current user |
7336
|
|
|
* |
7337
|
|
|
* @return bool Restricted to user response. |
7338
|
|
|
*/ |
7339
|
|
|
function getItemRestrictedUsersList($itemId, $userId) |
7340
|
|
|
{ |
7341
|
|
|
// Get item date |
7342
|
|
|
$itemRestrictedUsersList = DB::queryFirstRow( |
7343
|
|
|
'SELECT restricted_to |
7344
|
|
|
FROM ' . prefixTable('items') . ' |
7345
|
|
|
WHERE id = %i', |
7346
|
|
|
$itemId |
7347
|
|
|
); |
7348
|
|
|
// Check if user is in the list of restriction if the item is restricted |
7349
|
|
|
if (empty($itemRestrictedUsersList['restricted_to']) === false) { |
7350
|
|
|
$restrictedUsers = array_map('intval', explode(';', $itemRestrictedUsersList['restricted_to'])); |
7351
|
|
|
if (!in_array($userId, $restrictedUsers, true)) { |
7352
|
|
|
return false; |
7353
|
|
|
} |
7354
|
|
|
} |
7355
|
|
|
|
7356
|
|
|
return true; |
7357
|
|
|
} |
7358
|
|
|
|
7359
|
|
|
/** |
7360
|
|
|
* Checks if the item is locked by another user or if there is an ongoing encryption process. |
7361
|
|
|
* If the item is locked, the function determines if the lock has expired or not. |
7362
|
|
|
* |
7363
|
|
|
* @param int $itemId The ID of the item to check |
7364
|
|
|
* @param object $session The current session object |
7365
|
|
|
* @param int $userId The ID of the current user |
7366
|
|
|
* @param string $actionType The type of action being performed (e.g., 'edit', 'delete') |
7367
|
|
|
* |
7368
|
|
|
* @return array True if the item is locked, false otherwise |
7369
|
|
|
*/ |
7370
|
|
|
function isItemLocked(int $itemId, $session, int $userId, string $actionType = ''): array |
7371
|
|
|
{ |
7372
|
|
|
global $SETTINGS; |
7373
|
|
|
|
7374
|
|
|
$now = time(); |
7375
|
|
|
$editionLocks = DB::query( |
7376
|
|
|
'SELECT timestamp, user_id, increment_id |
7377
|
|
|
FROM ' . prefixTable('items_edition') . ' |
7378
|
|
|
WHERE item_id = %i |
7379
|
|
|
ORDER BY increment_id DESC', |
7380
|
|
|
$itemId |
7381
|
|
|
); |
7382
|
|
|
|
7383
|
|
|
// Check if there are any locks for this item |
7384
|
|
|
if (count($editionLocks) === 0 && $actionType === 'edit') { |
7385
|
|
|
// If no locks exist and the action is 'edit', create a new lock |
7386
|
|
|
createEditionLock($itemId, $userId, $now); |
7387
|
|
|
return [ |
7388
|
|
|
'status' => false, |
7389
|
|
|
]; |
7390
|
|
|
} |
7391
|
|
|
|
7392
|
|
|
// Check if the last lock is older than the defined period |
7393
|
|
|
$lastLock = $editionLocks[0]; |
7394
|
|
|
|
7395
|
|
|
// If the lock is for the current user, update the timestamp |
7396
|
|
|
if ((int) $lastLock['user_id'] === $userId) { |
7397
|
|
|
DB::update( |
7398
|
|
|
prefixTable('items_edition'), |
7399
|
|
|
['timestamp' => $now], |
7400
|
|
|
'increment_id = %i', |
7401
|
|
|
$lastLock['increment_id'] |
7402
|
|
|
); |
7403
|
|
|
return [ |
7404
|
|
|
'status' => false, |
7405
|
|
|
]; |
7406
|
|
|
} |
7407
|
|
|
|
7408
|
|
|
// Calculate the delay for the lock |
7409
|
|
|
$delay = isset($SETTINGS['delay_item_edition']) && $SETTINGS['delay_item_edition'] > 0 |
7410
|
|
|
? $SETTINGS['delay_item_edition'] * 60 |
7411
|
|
|
: EDITION_LOCK_PERIOD; |
7412
|
|
|
|
7413
|
|
|
// Calculate the elapsed time since the last lock |
7414
|
|
|
$elapsed = abs($now - (int) $lastLock['timestamp']); |
7415
|
|
|
|
7416
|
|
|
// Check if the lock has expired |
7417
|
|
|
if ($elapsed > $delay) { |
7418
|
|
|
// Delete all edition locks for this item |
7419
|
|
|
DB::delete(prefixTable('items_edition'), 'item_id = %i', $itemId); |
7420
|
|
|
|
7421
|
|
|
// Delete related background tasks if any |
7422
|
|
|
$task = DB::queryFirstRow( |
7423
|
|
|
'SELECT increment_id FROM ' . prefixTable('background_tasks') . ' |
7424
|
|
|
WHERE item_id = %i AND finished_at = ""', |
7425
|
|
|
$itemId |
7426
|
|
|
); |
7427
|
|
|
|
7428
|
|
|
// If a task is found, delete its related tasks |
7429
|
|
|
if (!empty($task)) { |
7430
|
|
|
deleteProcessAndRelatedTasks((int) $task['increment_id']); |
7431
|
|
|
} |
7432
|
|
|
|
7433
|
|
|
// Check if encryption process is still running |
7434
|
|
|
DB::queryFirstRow( |
7435
|
|
|
'SELECT JSON_EXTRACT(arguments, "$.all_users_except_id") AS all_users_except_id |
7436
|
|
|
FROM ' . prefixTable('background_tasks') . ' |
7437
|
|
|
WHERE item_id = %i AND finished_at = "" |
7438
|
|
|
ORDER BY increment_id DESC', |
7439
|
|
|
$itemId |
7440
|
|
|
); |
7441
|
|
|
|
7442
|
|
|
// If encryption process is not running, delete the lock |
7443
|
|
|
if (DB::count() === 0) { |
7444
|
|
|
DB::update( |
7445
|
|
|
prefixTable('items_edition'), |
7446
|
|
|
['timestamp' => $now], |
7447
|
|
|
'item_id = %i AND user_id = %i', |
7448
|
|
|
$itemId, |
7449
|
|
|
$userId |
7450
|
|
|
); |
7451
|
|
|
return [ |
7452
|
|
|
'status' => false, |
7453
|
|
|
]; |
7454
|
|
|
} |
7455
|
|
|
|
7456
|
|
|
return [ |
7457
|
|
|
'status' => true, // Encryption in progress |
7458
|
|
|
'delay' => $delay - $elapsed, // Time remaining before the lock expires |
7459
|
|
|
]; |
7460
|
|
|
} |
7461
|
|
|
|
7462
|
|
|
// Lock still valid and owned by another user |
7463
|
|
|
return [ |
7464
|
|
|
'status' => true, |
7465
|
|
|
'delay' => $delay - $elapsed, // Time remaining before the lock expires |
7466
|
|
|
]; |
7467
|
|
|
} |
7468
|
|
|
|
7469
|
|
|
/** |
7470
|
|
|
* Creates an edition lock for a given item and user |
7471
|
|
|
* |
7472
|
|
|
* @param int $itemId The ID of the item to lock |
7473
|
|
|
* @param int $userId The ID of the user who is locking the item |
7474
|
|
|
* @param int $timestamp The timestamp of the lock |
7475
|
|
|
* |
7476
|
|
|
* @return void |
7477
|
|
|
*/ |
7478
|
|
|
function createEditionLock(int $itemId, int $userId, int $timestamp): void |
7479
|
|
|
{ |
7480
|
|
|
DB::insert( |
7481
|
|
|
prefixTable('items_edition'), |
7482
|
|
|
[ |
7483
|
|
|
'timestamp' => $timestamp, |
7484
|
|
|
'item_id' => $itemId, |
7485
|
|
|
'user_id' => $userId, |
7486
|
|
|
] |
7487
|
|
|
); |
7488
|
|
|
} |
7489
|
|
|
|
7490
|
|
|
|
7491
|
|
|
/** |
7492
|
|
|
* Checks if there is an ongoing background encryption process for the given item. |
7493
|
|
|
* |
7494
|
|
|
* @param int $itemId The ID of the item to check |
7495
|
|
|
* |
7496
|
|
|
* @return bool True if an ongoing process is found, false otherwise |
7497
|
|
|
*/ |
7498
|
|
|
function isProcessOnGoing(int $itemId): bool |
7499
|
|
|
{ |
7500
|
|
|
// Check if there's an ongoing background encryption process for the item |
7501
|
|
|
$ongoingProcess = DB::queryFirstRow( |
7502
|
|
|
'SELECT 1 FROM ' . prefixTable('background_tasks') . ' WHERE item_id = %i AND finished_at = "" LIMIT 1', |
7503
|
|
|
$itemId |
7504
|
|
|
); |
7505
|
|
|
|
7506
|
|
|
// Return true if an ongoing process is found, otherwise false |
7507
|
|
|
return $ongoingProcess ? true : false; |
7508
|
|
|
} |
7509
|
|
|
|
7510
|
|
|
/** |
7511
|
|
|
* Retrieves the list of visible folders for a specific user from the cache_tree table. |
7512
|
|
|
* |
7513
|
|
|
* @param int $userId The ID of the user |
7514
|
|
|
* |
7515
|
|
|
* @return array An array of visible folders for the user |
7516
|
|
|
*/ |
7517
|
|
|
function getUserVisibleFolders(int $userId): array |
7518
|
|
|
{ |
7519
|
|
|
// Query to retrieve visible folders for the user |
7520
|
|
|
$data = DB::queryFirstRow('SELECT visible_folders FROM ' . prefixTable('cache_tree') . ' WHERE user_id = %i', $userId); |
7521
|
|
|
|
7522
|
|
|
// Decode JSON data into an array; return an empty array if the data is invalid |
7523
|
|
|
return json_decode($data['visible_folders'], true) ?? []; |
7524
|
|
|
} |
7525
|
|
|
|
7526
|
|
|
/** |
7527
|
|
|
* Determines access rights (edit/delete) based on the user's roles for a given folder. |
7528
|
|
|
* It checks the roles_values table to see the permissions defined for each role. |
7529
|
|
|
* |
7530
|
|
|
* @param object $session The current session object |
7531
|
|
|
* @param int $treeId The ID of the folder to check access rights for |
7532
|
|
|
* |
7533
|
|
|
* @return array An array containing edit and delete access rights [edit, delete] |
7534
|
|
|
*/ |
7535
|
|
|
function getRoleBasedAccess($session, int $treeId): array |
7536
|
|
|
{ |
7537
|
|
|
$edit = $delete = false; |
7538
|
|
|
|
7539
|
|
|
// Retrieve all role IDs assigned to the user |
7540
|
|
|
$roles = array_column($session->get('system-array_roles'), 'id'); |
7541
|
|
|
|
7542
|
|
|
// Query the access rights for the given roles and folder |
7543
|
|
|
$accessTypes = DB::queryFirstColumn( |
7544
|
|
|
'SELECT DISTINCT type FROM ' . prefixTable('roles_values') . ' WHERE role_id IN %ls AND folder_id = %i', |
7545
|
|
|
$roles, |
7546
|
|
|
$treeId |
7547
|
|
|
); |
7548
|
|
|
// Values to be checked |
7549
|
|
|
$check_value = 'W'; |
7550
|
|
|
// Values to be deleted |
7551
|
|
|
$delete_value = 'R'; |
7552
|
|
|
|
7553
|
|
|
// Check if $check_value exists |
7554
|
|
|
if (in_array($check_value, $accessTypes)) { |
7555
|
|
|
// Find the index of $delete_value in the array |
7556
|
|
|
$key = array_search($delete_value, $accessTypes); |
7557
|
|
|
|
7558
|
|
|
// If the value is found, delete |
7559
|
|
|
if ($key !== false) { |
7560
|
|
|
unset($accessTypes[$key]); |
7561
|
|
|
} |
7562
|
|
|
} |
7563
|
|
|
// Determine access rights based on the retrieved types |
7564
|
|
|
foreach ($accessTypes as $access) { |
7565
|
|
|
switch ($access) { |
7566
|
|
|
case 'ND': // No Delete |
7567
|
|
|
$edit = true; |
7568
|
|
|
$delete = false; |
7569
|
|
|
break; |
7570
|
|
|
case 'NE': // No Edit |
7571
|
|
|
$edit = false; |
7572
|
|
|
$delete = true; |
7573
|
|
|
break; |
7574
|
|
|
case 'NDNE': |
7575
|
|
|
case 'R': // Read only |
7576
|
|
|
$edit = $delete = false; |
7577
|
|
|
break; |
7578
|
|
|
case 'W': // Write access |
7579
|
|
|
$edit = $delete = true; |
7580
|
|
|
break; |
7581
|
|
|
} |
7582
|
|
|
} |
7583
|
|
|
return [$edit, $delete]; |
7584
|
|
|
} |
7585
|
|
|
|
7586
|
|
|
/** |
7587
|
|
|
* Constructs the final access response array with the given parameters. |
7588
|
|
|
* |
7589
|
|
|
* @param bool $error Indicates if there was an error |
7590
|
|
|
* @param bool $access Indicates if the user has access |
7591
|
|
|
* @param bool $edit Indicates if the user has edit rights |
7592
|
|
|
* @param bool $delete Indicates if the user has delete rights |
7593
|
|
|
* @param bool $editionLocked Indicates if the edition is locked |
7594
|
|
|
* |
7595
|
|
|
* @return array An array containing the access rights information |
7596
|
|
|
*/ |
7597
|
|
|
function getAccessResponse(bool $error, bool $access, bool $edit, bool $delete, array $editionLocked = []): array |
7598
|
|
|
{ |
7599
|
|
|
return [ |
7600
|
|
|
'error' => $error, |
7601
|
|
|
'access' => $access, |
7602
|
|
|
'edit' => $edit, |
7603
|
|
|
'delete' => $delete, |
7604
|
|
|
'edition_locked' => $editionLocked['status'] ?? false, |
7605
|
|
|
'edition_locked_delay' => $editionLocked['delay'] ?? null, |
7606
|
|
|
]; |
7607
|
|
|
} |
7608
|
|
|
|